Essays about: "kryptografi"

Showing result 11 - 15 of 36 essays containing the word kryptografi.

  1. 11. Keeping an Indefinitely Growing Audit Log

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Måns Andersson; [2022]
    Keywords : Cryptography; Audit Log; Tamper-evident; Merkle tree; Kryptografi; Granskningslogg; Manipuleringsupptäckbarhet; Merkle träd;

    Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE

  2. 12. Security Evaluation of Damper System’s Communication and Update Process : Threat modeling using vehicleLang and securiCAD

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Joar Ekelund; [2021]
    Keywords : Electronic Control Unit; Update; Automotive; Threat Modeling; vehicleLang; securiCAD; Styrenhet; Uppdatera; fordonsteknik; Hotmodellering; vehicleLang; securi- CAD;

    Abstract : As the automotive industry becomes increasingly reliant on digital systems it is of utmost importance that these systems are secure. Secure systems are of interest both for the general public as well as manufactures. READ MORE

  3. 13. Modelling and Analysis of Swedish Heavy Industry Supply Chain Data Management to Improve Efficiency and Security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Daniel Karlsson; [2021]
    Keywords : Supply chain management; Supply chain; Distributed systems; Distributed ledger technology; Blockchain; Hyperledger; Swedish heavy industry; Product certificates; Leveranskedja; Distribuerade system; Distribuerad databasteknik; Blockkedja; Hyperledger Fabric; Distribuerad liggare; Svenska tungindustrin; Datahantering;

    Abstract : Product certificates are sent throughout the supply chain of Swedish heavy industry in order to show provenance and physical characteristics of objects such as screws. The data management of the certificates has been, and still is, a very manual process. The process requires extensive work in order to maintain a correct record of the certificates. READ MORE

  4. 14. Multiparty adversarial neural cryptography with symmetric and asymmetric encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tianpeng Ju; [2021]
    Keywords : Cryptography; neural network; asymmetric encryption; multiparty systems; Kryptografi; neuronnätverk; asymmetrisk kryptering; flerpartssystem;

    Abstract : Deep learning has shown excellent performance in image recognition, speech recognition, natural language processing and other fields over the recent decades. Cryptography is a technical science that studies the preparation and decoding of ciphers. READ MORE

  5. 15. Client controlled, secure endpointto-endpoint storage in the cloud

    University essay from KTH/Hälsoinformatik och logistik

    Author : Maximilian Michelson; [2020]
    Keywords : ;

    Abstract : Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as theydistrust the cloud providers with keeping sensitive data secret and are afraid of violating GDPR.Softronic wants to prove that data can be kept protected using encryption, even though it is storedin a cloud, and the goal of this thesis is to find a cryptographic solution with good security and performance. READ MORE