Sökning: "Krypterade"

Hittade 5 avhandlingar innehållade ordet Krypterade.

  1. 1. Vikingatida runbleck : Läsningar och tolkningar

    Författare :Sofia Pereswetoff-Morath; Henrik Williams; Magnus Källström; Veturliði Óskarsson; Judith Jesch; Uppsala universitet; []
    Nyckelord :HUMANIORA; HUMANITIES; runes; runic inscriptions; runic plates; runic inscriptions in metal; runes on non-monumental objects; cryptic runic inscriptions; reading and interpreting; methods of interpretation; Viking-Age; incantations; magic formulas; amulets; magic; runor; runinskrifter; runbleck; runinskrifter i metall; runor på lösföremål; krypterade runinskrifter; att läsa och tolka; tolkningsmetodiker; vikingatiden; besvärjelser; trollformler; amuletter; magi;

    Sammanfattning : Föreliggande avhandling syftar till att utveckla läsningen och tolkningen av inskrifterna på de i dagsläget 46 kända vikingatida runblecken. Målet är att ge en så tydlig bild som möjligt av inskriftsgenren vikingatida runbleck. I detta syfte har upprepade fältundersökningar av runblecken genomförts med stereomikroskop. LÄS MER

  2. 2. On Certificate Transparency Verification and Unlinkability of Websites Visited by Tor Users

    Författare :Rasmus Dahlberg; Tobias Pulls; Stefan Lindskog; Steven J. Murdoch; Karlstads universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Auditing; Certificate Transparency; DNS; Gossip; Side-Channels; Timing Attacks; Tor; Tor Browser; Website Fingerprinting; Website Oracles; Granskning; Certificate Transparency; DNS; Skvaller; Sidokanaler; Tidtagningsattacker; Tor; Torswebbläsare; Mönsterigenkänning; Webbplatsorakel; Computer Science; Datavetenskap;

    Sammanfattning : Certificate Transparency is an ecosystem of logs, monitors, and auditors that hold certificate authorities accountable while issuing certificates. We show how the amount of trust that TLS clients and domain owners need to place in Certificate Transparency can be reduced, both in the context of existing gradual deployments and the largely unexplored area of Tor. LÄS MER

  3. 3. Formal Verification of Peripheral Memory Isolation

    Författare :Jonas Haglund; Roberto Guanciale; Mads Dam; Gligor Virgil; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; formal verification; interactive theorem proving; direct memory access; memory isolation; input output; formell verifiering; interaktiv datorassisterad beviskonstruktion; direkt minnesåtkomst; minnesisolering; indata utdata; Datalogi; Computer Science;

    Sammanfattning : In many contexts, computers run both critical and untrusted software,necessitating the need for isolating critical software from untrusted software.These computers contain CPUs, memory and peripherals. LÄS MER

  4. 4. Defense of Cyber-Physical Systems Against Learning-based Attackers

    Författare :Rijad Alisic; Henrik Sandberg; Karl H. Johansson; Miroslav Pajic; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Control Theory; Security; Privacy; Machine Learning; Cyber-Physical Systems; Change Point Problems; Electrical Engineering; Elektro- och systemteknik;

    Sammanfattning : Cyberattacks against critical infrastructures pose a serious threat to society, as they can have devastating consequences on the economy, security, or public health. These infrastructures rely on a large network of cyber components, such as sensors, controllers, computers, and communication devices, to monitor and control their physical processes. LÄS MER

  5. 5. Cryptanalysis of Selected Stream Ciphers

    Författare :Paul Stankovski; Institutionen för elektro- och informationsteknik; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Stream cipher; cryptanalysis; FCSR; state recovery; linear relations; optimal sampling; distinguisher; HC; nonrandomness; greedy bit set algorithm.;

    Sammanfattning : The aim of this dissertation is to show some cryptanalytical results on a selection of stream ciphers. We have grouped theory and results into three main parts. The first part focuses on the FCSR-based constructions X-FCSR and F-FCSR-H v3. For the X-FCSR family of stream ciphers we perform a severe state recovery attack. LÄS MER