Essays about: "technology for national security"

Showing result 21 - 25 of 83 essays containing the words technology for national security.

  1. 21. Security Analysis of Microservice Choices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Daniel Dannberg; [2021]
    Keywords : Threat modeling; Security; Microservices; The Common Misuse Scoring System; National Institute of Standards and Technology; Return Of Security Investment; Hotmodellering; Säkerhet; Mikrotjänster; Säkerhetsinvestering; Evaluering av säkerhet;

    Abstract : Security research is beneficial for companies that want their system protected against threats to their business. The focus of this project is on security considerations. These considerations are with regards to when companies want to evaluate the benefits of extracting microservices from their monolithic system. READ MORE

  2. 22. SWOT-PESTEL Study of Constraints to Decarbonization of the Natural Gas System in the EU Techno-economic analysis of hydrogen production in Portugal : Techno-economic analysis of hydrogen production in Portugal

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : ROHAN ADITHYA VASUDEVAN; [2021]
    Keywords : Decarbonization; Natural Gas System; SWOT Strength; Weakness; and Opportunities Weakness ; PESTEL Political; Economic; Social; Technological; Environmental Legal ; Green Hydrogen; Blue Hydrogen; Methane Reforming; Electrolysis; LCOH Levelized Cost of Hydrogen ; Avkolningen; Naturgas systemet; SWOT Strength; Weakness; and Opportunities Weakness ; PESTEL Political; Economic; Social; Technological; Environmental Legal ; Grönt väte; Blå väte; Metanreformering; Elektrolys;

    Abstract : The exigent need to address climate change and its adverse effects is felt all around the world. As pioneers in tackling carbon emissions, the European Union continue to be head and shoulders above other continents by implementing policies and keeping a tab on its carbon dependence and emissions. READ MORE

  3. 23. Evaluating the onshore wind power potential of Gotland using the New European Wind Atlas

    University essay from Uppsala universitet/Institutionen för geovetenskaper

    Author : Andres Arteaga Ossa; [2021]
    Keywords : ;

    Abstract : The island of Gotland has played an important role in the history of wind energy in Sweden since the very beginning. In the past decade, the island reached the maximum intermittent wind power capacity that the local grid and the current connection to the mainland can safely manage without compromising the security of supply. READ MORE

  4. 24. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Alex Gustafsson; Carl Stensson; [2021]
    Keywords : Public-Key Cryptography; Benchmark; x86; IBM Z; z15; Asymmetrisk Kryptering; Prestandatest; x86; IBM Z; z15;

    Abstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE

  5. 25. Exploring Side-Channel Analysis Targeting FPGA Based RISC-V Architecture : Attempts at Performing Attacks in Preparation for Future PQC Algorithms

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Vilhelmson Näf; [2021]
    Keywords : Post-Quantum Cryptography; Field Programmable Gate Array; Neural Network; Learning With Errors Rounding; Key Encapsulation Mechanism; Post-Quantum Cryptography; Field Programmable Gate Array; Neural Network; Learning With Errors Rounding; Key Encapsulation Mechanism;

    Abstract : Many public-key cryptosystems currently in use are threatened by the possibility of large-scale quantum computers being built in the future. To counteract this, a process of developing quantum-resistant cryptographic algorithms is underway. This process also emphasizes the importance of protecting algorithms from Side-Channel Analysis (SCA). READ MORE