Essays about: "technology for national security"
Showing result 21 - 25 of 83 essays containing the words technology for national security.
-
21. Security Analysis of Microservice Choices
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Security research is beneficial for companies that want their system protected against threats to their business. The focus of this project is on security considerations. These considerations are with regards to when companies want to evaluate the benefits of extracting microservices from their monolithic system. READ MORE
-
22. SWOT-PESTEL Study of Constraints to Decarbonization of the Natural Gas System in the EU Techno-economic analysis of hydrogen production in Portugal : Techno-economic analysis of hydrogen production in Portugal
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : The exigent need to address climate change and its adverse effects is felt all around the world. As pioneers in tackling carbon emissions, the European Union continue to be head and shoulders above other continents by implementing policies and keeping a tab on its carbon dependence and emissions. READ MORE
-
23. Evaluating the onshore wind power potential of Gotland using the New European Wind Atlas
University essay from Uppsala universitet/Institutionen för geovetenskaperAbstract : The island of Gotland has played an important role in the history of wind energy in Sweden since the very beginning. In the past decade, the island reached the maximum intermittent wind power capacity that the local grid and the current connection to the mainland can safely manage without compromising the security of supply. READ MORE
-
24. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE
-
25. Exploring Side-Channel Analysis Targeting FPGA Based RISC-V Architecture : Attempts at Performing Attacks in Preparation for Future PQC Algorithms
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Many public-key cryptosystems currently in use are threatened by the possibility of large-scale quantum computers being built in the future. To counteract this, a process of developing quantum-resistant cryptographic algorithms is underway. This process also emphasizes the importance of protecting algorithms from Side-Channel Analysis (SCA). READ MORE