Essays about: "kryptografi"
Showing result 21 - 25 of 36 essays containing the word kryptografi.
-
21. Automatic secret synchronisation across heterogeneous IT environments
University essay from KTH/Hälsoinformatik och logistikAbstract : Following circumstances such as mergers and acquisitions, the IT systemsassociated with the participating organisations may need to share access towardsservices and systems with eachother. Access towards systems and services is oftencontrolled using secret information such as passwords or keys. READ MORE
-
22. Protection of Personal Data in Blockchain Technology : An investigation on the compatibility of the General Data Protection Regulation and the public blockchain
University essay from Stockholms universitet/Institutet för rättsinformatik (IRI)Abstract : On 25 May 2018 the General Data Protection Regulation, GDPR, came into force in the EU. The regulation strengthened the rights of the data subjects’ in relation to the data controllers and processors and gave them more control over their personal data. READ MORE
-
23. A secure multi-party scheme with certificateless cryptography for secret key extraction
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Many systems contain sensitive data such as user credentials used for authentication purposes. For large systems, a common approach is to store the data in a configuration file at a trusted third party. However, that would imply a single point of failure if an adversary gains access to the trusted party. READ MORE
-
24. On Intersections of Algebraic Curves and Applications to Elliptic Curves
University essay from Lunds universitet/Matematik (naturvetenskapliga fakulteten)Abstract : In this thesis we state and give elementary proofs for some fundamental results about intersections of algebraic curves, namely Bezout's, Max Noether's, Pappus's, Pascal's and Chasles' theorems. Our main tools are linear algebra and basic ring theory. We conclude the thesis by applying the results to elliptic curves.. READ MORE
-
25. Encrypting IMSI to improve privacy in 5G Networks
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Nowadays, the long-term identifier of a user in a mobile network, namely International Mobile Subscriber Identity or IMSI, is transmitted in clear text over the radiointerface. Given that this interface is used as a shared medium, anyone with a radio transceiver and processing software can thus read such identifier. READ MORE