Essays about: "end to end encryption"

Showing result 1 - 5 of 31 essays containing the words end to end encryption.

  1. 1. Evaluating intrusion detection points in an end-to-end solution

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Lilla Pankaczi; [2023]
    Keywords : RFID; Random UID; Mutual Authentication; Scyther;

    Abstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE

  2. 2. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ossian Dillner; [2023]
    Keywords : Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE

  3. 3. Development of a QRNG front-end for shot noise measurement : analysis of quantum shot noise originating from photodiodes

    University essay from Linköpings universitet/Informationskodning

    Author : Martin Clason; [2023]
    Keywords : shot noise; quantum random number generator; photodiode; transimpedance amplifier; skottbrus; kvantslumptalsgenerator; fotodiod; transimpedansförstärkare;

    Abstract : As one of the more mature quantum technologies, quantum random number generators (QRNGs) fill an important role in producing secure and private keys for use in cryptogra- phy in e.g. quantum key distribution (QKD) systems. Many available QRNGs are expen- sive and optical QRNGs often require complex optical setups. READ MORE

  4. 4. Cloud-Based Collaborative Local-First Software

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Tor Vallin; [2023]
    Keywords : Cloud Computing; Local-First Software; End-to-End Encryption; Privacy; Scalability;

    Abstract : Local-first software has the potential to offer users a great experience by combining the best aspects of traditional applications with cloud-based applications. However, not much has been documented regarding developing backends for local-first software, particularly one that is scalable while still supporting end-to-end encryption. READ MORE

  5. 5. FFS: A cryptographic cloud-based deniable filesystem through exploitation of online web services : Store your sensitive data in plain sight

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Glenn Olsson; [2023]
    Keywords : Filesystem; Fejk FileSystem; Cloud-based filesystem; Steganograhpic filesystem; Filsystem; Fejk FileSystem; Molnbaserat filsystem; Steganografiskt filsystem;

    Abstract : Many Online Web Services (OWSs) today, such as Flickr and Twitter, provide users with the possibility to post images that are stored on the platform for free. This thesis explores creating a cryptographically secure filesystem that stores its data on an online web service by encoding the encrypted data as images. READ MORE