Essays about: "keys"
Showing result 21 - 25 of 249 essays containing the word keys.
-
21. Anonymization of Sensitive Data through Cryptography
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. READ MORE
-
22. Simulator improvements and scenario testing
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The usage of a graphical user interface (GUI) in software often make up for a greatexperience for the user and is often not an issue, until the only way to run a programis through a GUI. Such a dependency will make development of a project very hardas the only way to perform tests is to execute them manually. READ MORE
-
23. Designing a solution for automating the management of a capture the flag network
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Everyday one hears about another cyber attack against a company or state. In 2023 the cost of cyber crime reached 8 trillion USD and is expected to reach 10 trillion in 2025 [1]. It is becoming increasingly clear that cyber security is important in modern society and especially in the IT industry. READ MORE
-
24. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. READ MORE
-
25. Cryptography Executed in Web Browsers – Achieving Convenient End-to-End Security for Lock Access Control
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Many client-server applications are not protected with end-to-end security, allowing the web server to control all data. In this thesis, the feasibility of executing modern cryptography on the web browser has been evaluated and proposed an end-to-end security design for cloud-based lock access control. READ MORE