Sökning: "encryption"
Visar resultat 6 - 10 av 53 avhandlingar innehållade ordet encryption.
6. Towards Measurable and Tunable Security
Sammanfattning : Many security services today only provides one security configuration at run-time, and cannot then utilize the trade-off between performance and security. In order to make use of this trade-off, tunable security services providing several security configurations that can be selected at run-time are needed. LÄS MER
7. Decentralized Application Security
Sammanfattning : On the internet today, everything is centralized. For most people, a single commercial entity owns the power to disclose all their personal emails. Most commonly your emails are only disclosed to you and your correspondent, but the power to choose who sees these emails is in fact not yours. LÄS MER
8. Tinkering the Wicked Problem of Privacy : Design Challenges and Opportunities for Crypto-based Services
Sammanfattning : Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. LÄS MER
9. Attribute-based Approaches for Secure Data Sharing in the Industry
Sammanfattning : In the Industry 4.0 era, secure and efficient data sharing is vital for innovation and operational enhancement. Industry 4.0 envisions a highly connected ecosystem where machines, devices, and stakeholders collaborate in real time to optimize processes, enhance productivity, and create new value propositions. LÄS MER
10. Social Networks and Privacy
Sammanfattning : Centralized online social networks pose a threat to their users’ privacy as social network providers have unlimited access to users’ data. Decentralized social networks address this problem by getting rid of the provider and giving control to the users themselves, meaning that only the end-users themselves should be able to control access of other parties to their data. LÄS MER