Essays about: "security algorithm evaluation"
Showing result 1 - 5 of 32 essays containing the words security algorithm evaluation.
-
1. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE
-
2. Characterization and Stabilization of Transverse Spatial Modes of Light in Few-Mode Optical Fibers
University essay from Linköpings universitet/InformationskodningAbstract : With the growing need for secure and high-capacity communications, innovative solutions are needed to meet the demands of tomorrow. One such innovation is to make use of the still unutilized spatial dimension of light in communications, which has promising applications in both enabling higher data traffic as well as the security protocols of the future in quantum communications. READ MORE
-
3. Face Identification Using Eigenfaces and LBPH : A Comparative Study
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: With the rise of digitalization, there has been an increasing needfor secure and effective identification solutions, particularly in the realm of votingsystems. Facial biometric technology has emerged as a potential solution to combat fraud and improve the transparency and security of the voting process. READ MORE
-
4. Authentication Techniques Based on Physical Layer Attributes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE
-
5. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE