Essays about: "secure key storage"
Showing result 11 - 15 of 38 essays containing the words secure key storage.
-
11. Login hardening with Multi-factor Authentication
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The aim with this Master’s Thesis work was to conduct research about different available authenticators, as well as implementing a multi-factor authenticator into the currently used login-application. The research included biometric authentication technologies, and investigation of how to implement these to create a highly secure and customizable multi-factor authentication for My Axis-accounts for Axis Communications in Lund. READ MORE
-
12. An assessment of the solar and battery storage potential in Hammarby Sjöstad and its grid impact
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Urbanization, technological development, increasing population and fast transition towards electricity in both industries and the car sector bring challenges to the Swedish power network. The increasingdemand of both electricity and capacity within the cities create demand of the networks. READ MORE
-
13. Client controlled, secure endpointto-endpoint storage in the cloud
University essay from KTH/Hälsoinformatik och logistikAbstract : Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as theydistrust the cloud providers with keeping sensitive data secret and are afraid of violating GDPR.Softronic wants to prove that data can be kept protected using encryption, even though it is storedin a cloud, and the goal of this thesis is to find a cryptographic solution with good security and performance. READ MORE
-
14. Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. READ MORE
-
15. Comparison of blockchain e-wallet implementations
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rise of blockchain technology and cryptocurrency, secure e-wallets also become more important. But what makes an e-wallet secure? In this report, we compare different aspects of ewallets to see which alternatives are secure and convenient enough to be used.This report contains comparative analyses of different implementation for e-wallets. READ MORE