Essays about: "encryption techniques"

Showing result 1 - 5 of 29 essays containing the words encryption techniques.

  1. 1. XZDDF Bootstrapping in Fully Homomorphic Encryption

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Simon Ljungbeck; [2024]
    Keywords : Fully Homomorphic Encryption; Homomorphic Encryption; Bootstrapping; Blind Rotation; XZDDF; Technology and Engineering;

    Abstract : Despite the vast research on the topic in recent years, fully homomorphic encryption schemes remain time-inefficient. The main bottleneck is the so-called bootstrapping, whose purpose is to reduce noise that has accumulated after having performed homomorphic operations on a ciphertext. READ MORE

  2. 2. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  3. 3. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

    University essay from KTH/Hälsoinformatik och logistik

    Author : Ahmad Al Khateeb; Abdulrazzaq Summaq; [2023]
    Keywords : Access Control; Authorization; Keycloak; GPG Keys; Encryption; GitLab; Version Control; Neo4j; Data Security;

    Abstract : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. READ MORE

  4. 4. Exploring Architectural Techniques to Improve the Efficiency of Memory Security

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Jesper Sjöstrand; [2022]
    Keywords : ;

    Abstract : Memory encryption has so far often had too much overhead to be practical. If it were possible to reduce this overhead by reducing the frequency which the memory is written to it could make memory encryption systems more feasible and widely used. Research has shown that a significant percentage of stores write the same data as is already in memory. READ MORE

  5. 5. Anomaly Detection in a SQL database: A Retrospective Investigation

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Vahid Naserinia; Mikael Beremark; [2022]
    Keywords : Anomaly Detection; Machine Learning; Data Mining; Database Security; Intrusion Detection.;

    Abstract : Insider attacks aiming at stealing data are highly common, according to recent studies, and they are carried out in precise patterns. In order to protect against these threats, additional security measures, such as access control and encryption, must be used in conjunction with tools and methods that can detect anomalies in data access. READ MORE