Essays about: "kryptografi"
Showing result 11 - 15 of 36 essays containing the word kryptografi.
-
11. Keeping an Indefinitely Growing Audit Log
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE
-
12. Security Evaluation of Damper System’s Communication and Update Process : Threat modeling using vehicleLang and securiCAD
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As the automotive industry becomes increasingly reliant on digital systems it is of utmost importance that these systems are secure. Secure systems are of interest both for the general public as well as manufactures. READ MORE
-
13. Modelling and Analysis of Swedish Heavy Industry Supply Chain Data Management to Improve Efficiency and Security
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Product certificates are sent throughout the supply chain of Swedish heavy industry in order to show provenance and physical characteristics of objects such as screws. The data management of the certificates has been, and still is, a very manual process. The process requires extensive work in order to maintain a correct record of the certificates. READ MORE
-
14. Multiparty adversarial neural cryptography with symmetric and asymmetric encryption
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Deep learning has shown excellent performance in image recognition, speech recognition, natural language processing and other fields over the recent decades. Cryptography is a technical science that studies the preparation and decoding of ciphers. READ MORE
-
15. Client controlled, secure endpointto-endpoint storage in the cloud
University essay from KTH/Hälsoinformatik och logistikAbstract : Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as theydistrust the cloud providers with keeping sensitive data secret and are afraid of violating GDPR.Softronic wants to prove that data can be kept protected using encryption, even though it is storedin a cloud, and the goal of this thesis is to find a cryptographic solution with good security and performance. READ MORE