Advanced search

Found 3 essays matching the above criteria.

  1. 1. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Alex Gustafsson; Carl Stensson; [2021]
    Keywords : Public-Key Cryptography; Benchmark; x86; IBM Z; z15; Asymmetrisk Kryptering; Prestandatest; x86; IBM Z; z15;

    Abstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE

  2. 2. Contemporary Online Banking Fraud in Norway : A case study

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Daniel Weenås Aspvik; Preben Weenås Aspvik; [2020]
    Keywords : E-banking fraud; Fraud prevention; Fraud techniques; Internet Banking; Internet fraud; Informatics; Information systems; Norway; Online banking fraud; Online security;

    Abstract : Banks are currently battling rising of fraudulent activities as it damages their relationship with their customers. Online banking fraud is decreasing trust and confidence among the customers and decreasing operating performance and increasing cost for the banks. READ MORE

  3. 3. Two Way Mobile Authentication System

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Karthik Mandava; Harish Dinne; [2010]
    Keywords : Two factor authentication; One Time Password OTP ; Demo online Banking application; computer security; mobile device for authentication;

    Abstract : The ever increasing use of internet around the world has without doubt increased the usage of internet based services, e-business models, easier ways of communication and information sharing. Such drastic increase in usage of network based systems has made the current cyber security systems old dated as the hackers and attackers of networked systems is on the rise with new and modern attack methodologies. READ MORE