Essays about: "encryption"

Showing result 1 - 5 of 169 essays containing the word encryption.

  1. 1. Tiny Security : Evaluating energy   use for security in an IoT application

    University essay from Mittuniversitetet/Institutionen för data- och systemvetenskap

    Author : Mårten Söderquist; [2019]
    Keywords : Security; constrained device; AES; IoT; sensors; AEAD; ATmega1284P; ACORN128;

    Abstract : IoT devices are   increasingly used in the process of gathering scientific data. In   environmental monitoring IoT devices can be used as remote sensing devices to   collect information about e.g. temperature. READ MORE

  2. 2. Secure Intermittent Computing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Henricus Wouters; [2019]
    Keywords : ;

    Abstract : Low-power embedded systems exist in many forms. Using batteries for these devices generally imposes high maintenance costs and there are many applications where a grid connection is not feasible [1]. A solution for powering this class of embedded systems is energy harvesting. READ MORE

  3. 3. Secure handling of encryption keys for small businesses : A comparative study of key management systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap; Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Jacob Gustafsson; Adam Törnkvist; [2019]
    Keywords : Key management system; encryption keys; cryptography; comparison; Nyckelhantering; krypteringsnycklar; kryptering; jämförelse;

    Abstract : Background: A recent study shows that key management in the cooperate world is very painful due to, among other reasons, a lack of knowledge and resources. Instead, some companies embed the encryption keys and other software secrets directly in the source code for the application that uses them, introducing the risk of exposing the secrets. READ MORE

  4. 4. Benchmarking Framework for Transparent Data Encryption Systems

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik; Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Feidias Moulianitakis; Konstantinos Asimakopoulos; [2019]
    Keywords : Transparent Data Encryption; benchmarking framework; encryption performance; Design Research; Cryptography;

    Abstract : In the digital world of today, information is always at risk regardless of its state, at rest or in transit. Cryptography is the technology that promises to address the security issues that emerge. Hence, it was a reasonable consequence to introduce cryptography to databases. READ MORE

  5. 5. Local And Network Ransomware Detection Comparison

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Filip Ahlgren; [2019]
    Keywords : Ransomware; Detection; Machine Learning;

    Abstract : Background. Ransomware is a malicious application encrypting important files on a victim's computer. The ransomware will ask the victim for a ransom to be paid through cryptocurrency. After the system is encrypted there is virtually no way to decrypt the files other than using the encryption key that is bought from the attacker. READ MORE