Essays about: "encryption techniques"
Showing result 1 - 5 of 29 essays containing the words encryption techniques.
-
1. XZDDF Bootstrapping in Fully Homomorphic Encryption
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Despite the vast research on the topic in recent years, fully homomorphic encryption schemes remain time-inefficient. The main bottleneck is the so-called bootstrapping, whose purpose is to reduce noise that has accumulated after having performed homomorphic operations on a ciphertext. READ MORE
-
2. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE
-
3. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability
University essay from KTH/Hälsoinformatik och logistikAbstract : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. READ MORE
-
4. Exploring Architectural Techniques to Improve the Efficiency of Memory Security
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Memory encryption has so far often had too much overhead to be practical. If it were possible to reduce this overhead by reducing the frequency which the memory is written to it could make memory encryption systems more feasible and widely used. Research has shown that a significant percentage of stores write the same data as is already in memory. READ MORE
-
5. Anomaly Detection in a SQL database: A Retrospective Investigation
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Insider attacks aiming at stealing data are highly common, according to recent studies, and they are carried out in precise patterns. In order to protect against these threats, additional security measures, such as access control and encryption, must be used in conjunction with tools and methods that can detect anomalies in data access. READ MORE