Essays about: "encryption"

Showing result 21 - 25 of 274 essays containing the word encryption.

  1. 21. Privacy Preserving Biometric Multi-factor Authentication

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Emil Gedenryd; [2023]
    Keywords : Fully Homomorphic Encryption; Machine Learning; Biometric Authentication; Technology and Engineering;

    Abstract : This thesis investigates the viability of using Fully Homomorphic Encryption and Machine Learning to construct a privacy-preserving biometric multi-factor authentication system. The system is based on the architecture described as ”Model K - Store distributed, compare distributed” in ISO/IEC 24745:2022 and uses the Torus Fully Homomorphic Encryption scheme proposed by Chillotti et al. READ MORE

  2. 22. Efficient Memory Encryption for Neural Network Accelerators

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : George-Alexandru Stoian; [2023]
    Keywords : ;

    Abstract : The widespread integration of machine learning (ML) in edge and mobile devices, particularly in critical contexts like autonomous vehicles, highlights the need for robust security. However, ensuring data confidentiality and preserving inference integrity is costly due to the mismatch between traditional security methods and ML demands. READ MORE

  3. 23. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

    University essay from KTH/Hälsoinformatik och logistik

    Author : Ahmad Al Khateeb; Abdulrazzaq Summaq; [2023]
    Keywords : Access Control; Authorization; Keycloak; GPG Keys; Encryption; GitLab; Version Control; Neo4j; Data Security;

    Abstract : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. READ MORE

  4. 24. Anonymization of Sensitive Data through Cryptography

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isac Holm; Johan Dahl; [2023]
    Keywords : Cryptography; Encryption; Decryption; AES; Camellia; Anonymization; Sensitive Data;

    Abstract : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. READ MORE

  5. 25. An Arrow Metalanguage for Partially Invertible Computation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anders Ågren Thuné; [2023]
    Keywords : Reversible computation; Domain-specific languages; Arrows; Partial invertibility; Reversibel beräkning; Domänspecifika språk; Arrows; Partiell inverterbarhet;

    Abstract : Programming languages traditionally describe computations going one way: a program might compute a hash value from a string, or an encrypted message from a plaintext. However, sometimes it is also of interest to go the other way around: for encryption, we not only want to encrypt messages but also to decrypt them, and to be sure that the decryption correctly reproduces the original message. READ MORE