Essays about: "kryptografi"

Showing result 21 - 25 of 36 essays containing the word kryptografi.

  1. 21. Automatic secret synchronisation across heterogeneous IT environments

    University essay from KTH/Hälsoinformatik och logistik

    Author : Johan Wedin; Filip Ek Johansson; [2019]
    Keywords : security; secrets; secret management; system integration; cryptography; computer security; säkerhet; hemligheter; hemlighetshantering; systemintegration; kryptografi; datasäkerhet;

    Abstract : Following circumstances such as mergers and acquisitions, the IT systemsassociated with the participating organisations may need to share access towardsservices and systems with eachother. Access towards systems and services is oftencontrolled using secret information such as passwords or keys. READ MORE

  2. 22. Protection of Personal Data in Blockchain Technology : An investigation on the compatibility of the General Data Protection Regulation and the public blockchain

    University essay from Stockholms universitet/Institutet för rättsinformatik (IRI)

    Author : Amelia Wallace; [2019]
    Keywords : General Data Protection Regulation; GDPR; Blockchain; Transparency; Personal Data; Dataskyddsförordningen; GDPR; Blockkedja; Transparens; Teknikneutralitet; Personuppgift;

    Abstract : On 25 May 2018 the General Data Protection Regulation, GDPR, came into force in the EU. The regulation strengthened the rights of the data subjects’ in relation to the data controllers and processors and gave them more control over their personal data. READ MORE

  3. 23. A secure multi-party scheme with certificateless cryptography for secret key extraction

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dennis Fokin; [2018]
    Keywords : multi-party computation; secret sharing; certificateless cryptography; cryptography;

    Abstract : Many systems contain sensitive data such as user credentials used for authentication purposes. For large systems, a common approach is to store the data in a configuration file at a trusted third party. However, that would imply a single point of failure if an adversary gains access to the trusted party. READ MORE

  4. 24. On Intersections of Algebraic Curves and Applications to Elliptic Curves

    University essay from Lunds universitet/Matematik (naturvetenskapliga fakulteten)

    Author : Karl Lindén; [2018]
    Keywords : Bezout s theorem; Max Noether s fundamental theorem; Pappus s theorem; Pascal s theorem; Chasles theorem; algebraic curves; elliptic curves; Mathematics and Statistics;

    Abstract : In this thesis we state and give elementary proofs for some fundamental results about intersections of algebraic curves, namely Bezout's, Max Noether's, Pappus's, Pascal's and Chasles' theorems. Our main tools are linear algebra and basic ring theory. We conclude the thesis by applying the results to elliptic curves.. READ MORE

  5. 25. Encrypting IMSI to improve privacy in 5G Networks

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Enrique Cobo Jiménez; [2017]
    Keywords : 5G; Privacy; IMSI; Security; ECIES; Android; 5G; Personlig Integritet; IMSI; Säkerhet; ECIES; Android;

    Abstract : Nowadays, the long-term identifier of a user in a mobile network, namely International Mobile Subscriber Identity or IMSI, is transmitted in clear text over the radiointerface. Given that this interface is used as a shared medium, anyone with a radio transceiver and processing software can thus read such identifier. READ MORE