Essays about: "thesis for symmetric key cryptography"
Showing result 1 - 5 of 10 essays containing the words thesis for symmetric key cryptography.
-
1. Anonymization of Sensitive Data through Cryptography
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. READ MORE
-
2. Client controlled, secure endpointto-endpoint storage in the cloud
University essay from KTH/Hälsoinformatik och logistikAbstract : Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as theydistrust the cloud providers with keeping sensitive data secret and are afraid of violating GDPR.Softronic wants to prove that data can be kept protected using encryption, even though it is storedin a cloud, and the goal of this thesis is to find a cryptographic solution with good security and performance. READ MORE
-
3. Distributed ledger technology in the capital market : Shared versus private information in a permissioned blockchain
University essay from Uppsala universitet/Avdelningen för datalogiAbstract : This master thesis explores how blockchain technologies can be utilized within the financial sector with focus on how to store both private and public information on the blockchain. The capital market is looking into ways of cutting down administrative work through streamlining the financial process by using blockchain technologies. READ MORE
-
4. Access Control in the Internet of Things
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. READ MORE
-
5. Access Control in the Internet of Things
University essay from RISE./SICSAbstract : The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. READ MORE