Avancerad sökning
Visar resultat 1 - 5 av 53 avhandlingar som matchar ovanstående sökkriterier.
1. Tree Structures in Broadcast Encryption
Sammanfattning : The need for broadcast encryption arises when a sender wishes to securely distribute messages to varying subsets of receivers, using a broadcast channel, for instance in a pay-TV scenario. This is done by selecting subsets of users and giving all users in the same subset a common decryption key. LÄS MER
2. Guesswork and Entropy as Security Measures for Selective Encryption
Sammanfattning : More and more effort is being spent on security improvements in today's computer environments, with the aim to achieve an appropriate level of security. However, for small computing devices it might be necessary to reduce the computational cost imposed by security in order to gain reasonable performance and/or energy consumption. LÄS MER
3. Life of a Security Middlebox : Challenges with Emerging Protocols and Technologies
Sammanfattning : The Internet of today has intermediary devices known as middleboxes that perform more functions than the normal packet forwarding function of a router. Security middleboxes are a subset of these middleboxes and face an increasingly difficult task to perform their functions correctly. LÄS MER
4. Attribute-based Approaches for Secure Data Sharing in Industry
Sammanfattning : The Industry 4.0 revolution relies heavily on data to generate value, innovation, new services, and optimize current processes [1]. Technologies such as Internet of Things (IoT), machine learning, digital twins, and much more depend directly on data to bring value and innovation to both discrete manufacturing and process industries. LÄS MER
5. Deep Learning Side-Channel Attacks on Advanced Encryption Standard
Sammanfattning : Side-channel attacks (SCAs) have become one of the most realistic threats to implementations of cryptographic algorithms. By exploiting the nonprime, unintentional physical leakage, such as different amount of power consumed by the device during the execution of the cryptographic algorithm, SCAs are able to bypass the theoretical strength of cryptography and extract the secret key. LÄS MER