Search for dissertations about: "Christian Gehrmann"

Showing result 1 - 5 of 6 swedish dissertations containing the words Christian Gehrmann.

  1. 1. Topics in Authentication Theory

    Author : Christian Gehrmann; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; polynomial evaluation; anonymous secret sharing; multiround authentication; group authentication; threshold cryptography; MAC; secret sharing; cryptology; Authentication; authentication codes; Systems engineering; computer technology; Data- och systemvetenskap;

    Abstract : Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e. READ MORE

  2. 2. Bringing Visibility in the Clouds : using Security, Transparency and Assurance Services

    Author : Mudassar Aslam; Mats Björkman; Christian Gehrmann; Chris Mitchell; Mälardalens högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Cloud Security; Trusted Computing; Trustworthy Clouds; Cloud Audits; Security Automation; SCAP; Virtual Machine; Computer Science; datavetenskap;

    Abstract : The evolution of cloud computing allows the provisioning of IT resources over the Internet and promises many benefits for both - the service users and providers. Despite various benefits offered by cloud based services, many users hesitate in moving their IT systems to the cloud mainly due to many new security problems introduced by cloud environments. READ MORE

  3. 3. Secure Service Provisioning in a Public Cloud

    Author : Mudassar Aslam; Mats Björkman; Christian Gehrmann; Ben Smeets; Mälardalens högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; VM migration; trusted platforms; cloud security; IaaS; TPM; Security; Trusted Computing; Virtualization; Cloud Computing; trust; Computer Science; datavetenskap;

    Abstract : The evolution of cloud technologies which allows the provisioning of IT resources over the Internet promises many benefits for the individuals and enterprises alike. However, this new resource provisioning model comes with the security challenges which did not exist in the traditional resource procurement mechanisms. READ MORE

  4. 4. Towards Trustworthy and Secure Internet of Things Devices : Using hardware-assisted Trusted Execution and Automated Certification

    Author : Anum Khurshid; Shahid Raza; Thiemo Voigt; Christian Gehrmann; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Internet of Things; IoT device security; Trusted Execution Environments; Trusted Platform Module; TPM 2.0; IoT Certification; Assurance; TrustZone-M; TEE; Secure software updates; X.509;

    Abstract : The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT security through recent laws and regulations. A major part of IoT systems comprises of resource-constrained devices, with less margin in memory and computation capabilities to embed sophisticated security solutions. READ MORE

  5. 5. Security and Privacy in Smartphone Based Intelligent Transportation Systems

    Author : Vasileios Manolopoulos; Mohammed Ismail Elnaggar; Ana Rusu; Saul Rodriguez; Christian Gehrmann; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; SRA - ICT; SRA - Informations- och kommunikationsteknik;

    Abstract : .... READ MORE