Essays about: "keys"

Showing result 41 - 45 of 249 essays containing the word keys.

  1. 41. Evaluating performance of homomorphic encryption applied on delta encoding

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : János Richard Dani; [2022]
    Keywords : homomorphic encryption; delta encoding; performance test;

    Abstract : Homomorphic encryption is an encryption scheme that allows for simple operations on encrypted data. These operations are mainly boolean circuits combined into more complexarithmetic operations, rotations, and others. Homomorphic encryption was first implemented in 2009, and in the following decade, many different versions emerged. READ MORE

  2. 42. Unauthorized Smart Lock Access : Ethical Hacking of Smart Lock Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Albin Winkelmann; [2022]
    Keywords : IoT; threat modeling; computer security; smart lock; pentesting; IoT; hotmodellering; datasäkerhet; smarta lås; penetrationstestning;

    Abstract : IoT devices have become more common in our everyday lives as they provide more useful features than traditional devices. One such device is the smart door lock, which enables homeowners to grant access on a user-specified level through digital keys and remote operation. READ MORE

  3. 43. Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature Review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Asier Iriarte Murgiondo; [2022]
    Keywords : authentication; multi-factor authentication; Universal 2nd Factor; U2F; Timebased One-time Password; TOTP; usability; comparison; autenticación; autenticación de múltiples factores; Universal 2nd Factor; U2F; Time-based One-time Password; TOTP; usabilidad;

    Abstract : Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. READ MORE

  4. 44. Multipath transport protocol offloading

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013); Karlstads universitet/Avdelningen för datavetenskap

    Author : Rebecka Alfredsson; [2022]
    Keywords : QUIC; multipath; hardware offloading; DPDK; crypto; DPU;

    Abstract : Recently, we have seen an evolution of programmable network devices, where it is possible to customize packet processing inside the data plane at an unprecedented level. This is in contrast to traditional approaches, where networking device functionality is fixed and defined by the ASIC and customers need to wait possibly years before the vendors release new versions that add features required by customers. READ MORE

  5. 45. Socio-economic characteristics impact on covid-19 mortality in region Västra Götaland.

    University essay from Göteborgs universitet/Institutioen för biomedicin

    Author : Henrik Mellström Dahlgren; [2021-11-22]
    Keywords : ;

    Abstract : Background: There is a well establish association between low socio-economic status and health outcomes in general. To mitigate the impact of covid-19 there is a need to identify vulnerable groups, and to create methods that can do that in real-time as the virus-spread progress in the society. READ MORE