Essays about: "secrets"
Showing result 16 - 20 of 88 essays containing the word secrets.
-
16. Reverse Engineering of Deep Learning Models by Side-Channel Analysis
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-Channel Analysis (SCA) aims to extract secrets from cryptographic systems by exploiting the physical leakage acquired from implementations of cryptographic algorithms. With the development of Deep Learning (DL), a new type of SCA called Deep Learning Side-Channel Analysis (DLSCA) utilizes the advantages of DL techniques in data features processing to break cryptographic systems more efficiently. READ MORE
-
17. Forward-Backward Multiplicity Correlations for Proton-Proton Collisions with ALICE at LHC-CERN
University essay from Lunds universitet/Partikel- och kärnfysik; Lunds universitet/Fysiska institutionenAbstract : This thesis presents the study of two-particle pseudorapidity correlations in pp-collisions at √s = 13 TeV using the ALICE detector at LHC, CERN. The correlation function was calculated as a function of multiplicity and was repeated for several multiplicity classes and different charge combinations in the forward-backward and central regions of the detector, respectively. READ MORE
-
18. Full Material Declaration - A case study on the readiness for declaring Full Material Declaration of chemical substances in components, used in finished products
University essay from Lunds universitet/Miljövetenskaplig utbildning; Lunds universitet/Centrum för miljö- och klimatvetenskap (CEC)Abstract : The production and use of chemicals has grown exponentially over the past 50 years. Although the knowledge of hazards and risks associated with chemicals towards humans and the environment has increased, we know frightenedly little about how dangerous these might become when part of finished products. READ MORE
-
19. Cyber attacks against small companies that outsource their services
University essay from Högskolan Dalarna/Institutionen för information och teknikAbstract : Companies outsource a lot of their development tasks. The use of external development teams introduces security problems which may lead to data breaches and even corporate espionage where business ideas are used in other companies, leading to leaking of trade secrets. READ MORE
-
20. Security and performance impact of client-side token storage methods
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Applications store more data than ever before, including sensitive information such as user data, credit card information, and company secrets. Due to the value of this data, malicious actors have a financial incentive to employ a variety of attacks against applications in order to gain access to it. READ MORE