Essays about: "security algorithm evaluation"

Showing result 1 - 5 of 32 essays containing the words security algorithm evaluation.

  1. 1. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marcus Dypbukt Källman; [2023]
    Keywords : Cybersecurity; PageRank; Attack Graphs; Threat analysis; Threat modelling; Cybersäkerhet; PageRank; Attackgrafer; Hotanalys; Hotmodellering;

    Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE

  2. 2. Characterization and Stabilization of Transverse Spatial Modes of Light in Few-Mode Optical Fibers

    University essay from Linköpings universitet/Informationskodning

    Author : Oscar Pihl; [2023]
    Keywords : spatial modes; Space division multiplexing; SDM; superpositions; LP-modes; few-mode fibers; quantum communication; quantum optics; adaptive optics; stochastic parallel gradient descent; SPGD; mode control; QKD; polarization controller; paddle controller; QRNG; quantum random number generator; spatial modes; perturbation effects;

    Abstract : With the growing need for secure and high-capacity communications, innovative solutions are needed to meet the demands of tomorrow. One such innovation is to make use of the still unutilized spatial dimension of light in communications, which has promising applications in both enabling higher data traffic as well as the security protocols of the future in quantum communications. READ MORE

  3. 3. Face Identification Using Eigenfaces and LBPH : A Comparative Study

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : DEVI DEEPSHIKHA JAMI; NANDA SRIRAAM KAMBHAM; [2023]
    Keywords : face identification; LBPH; Eigenfaces;

    Abstract : Background: With the rise of digitalization, there has been an increasing needfor secure and effective identification solutions, particularly in the realm of votingsystems. Facial biometric technology has emerged as a potential solution to combat fraud and improve the transparency and security of the voting process. READ MORE

  4. 4. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  5. 5. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiao Jin; [2022]
    Keywords : Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE