Sökning: "Krypterade"
Hittade 5 avhandlingar innehållade ordet Krypterade.
1. Vikingatida runbleck : Läsningar och tolkningar
Sammanfattning : Föreliggande avhandling syftar till att utveckla läsningen och tolkningen av inskrifterna på de i dagsläget 46 kända vikingatida runblecken. Målet är att ge en så tydlig bild som möjligt av inskriftsgenren vikingatida runbleck. I detta syfte har upprepade fältundersökningar av runblecken genomförts med stereomikroskop. LÄS MER
2. On Certificate Transparency Verification and Unlinkability of Websites Visited by Tor Users
Sammanfattning : Certificate Transparency is an ecosystem of logs, monitors, and auditors that hold certificate authorities accountable while issuing certificates. We show how the amount of trust that TLS clients and domain owners need to place in Certificate Transparency can be reduced, both in the context of existing gradual deployments and the largely unexplored area of Tor. LÄS MER
3. Formal Verification of Peripheral Memory Isolation
Sammanfattning : In many contexts, computers run both critical and untrusted software,necessitating the need for isolating critical software from untrusted software.These computers contain CPUs, memory and peripherals. LÄS MER
4. Defense of Cyber-Physical Systems Against Learning-based Attackers
Sammanfattning : Cyberattacks against critical infrastructures pose a serious threat to society, as they can have devastating consequences on the economy, security, or public health. These infrastructures rely on a large network of cyber components, such as sensors, controllers, computers, and communication devices, to monitor and control their physical processes. LÄS MER
5. Cryptanalysis of Selected Stream Ciphers
Sammanfattning : The aim of this dissertation is to show some cryptanalytical results on a selection of stream ciphers. We have grouped theory and results into three main parts. The first part focuses on the FCSR-based constructions X-FCSR and F-FCSR-H v3. For the X-FCSR family of stream ciphers we perform a severe state recovery attack. LÄS MER