Search for dissertations about: "information theoretic security"

Showing result 1 - 5 of 14 swedish dissertations containing the words information theoretic security.

  1. 1. Applications of Information Inequalities to Linear Systems : Adaptive Control and Security

    Author : Ingvar Ziemann; Henrik Sandberg; Alexandre Proutiere; Nikolai Matni; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Stochastic Adaptive Control; Machine Learning; Fisher Information; Secure Control; Fundamental Limitations; Reinforcement Learning; Electrical Engineering; Elektro- och systemteknik;

    Abstract : This thesis considers the application of information inequalities, Cramér-Rao type bounds, based on Fisher information, to linear systems. These tools are used to study the trade-offs between learning and performance in two application areas: adaptive control and control systems security. READ MORE

  2. 2. Programming Language Design - Issues in Web Programming and Security

    Author : Niklas Broberg; Göteborgs universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Functional programming; web programming; dynamic loading; regular expressions; security; non-interference; calculus; core calculus; bisimulation; calculus;

    Abstract : This thesis consists of two separate parts. Both concern programming language design, the first in the domain of web programming and the other for security. READ MORE

  3. 3. Security Allocation in Networked Control Systems

    Author : Anh Tung Nguyen; André Teixeira; Emma Tegling; Uppsala universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Elektroteknik med inriktning mot reglerteknik; Electrical Engineering with specialization in Automatic Control;

    Abstract : Sustained use of critical infrastructure, such as electrical power and water distribution networks, requires efficient management and control. Facilitated by the advancements in computational devices and non-proprietary communication technology, such as the Internet, the efficient operation of critical infrastructure relies on network decomposition into interconnected subsystems, thus forming networked control systems. READ MORE

  4. 4. Toward Cyber-Secure and Resilient Networked Control Systems

    Author : André Teixeira; Henrik Sandberg; Karl H. Johansson; Kameshwar Poolla; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cyber Security; Resilience; Industrial Control Systems; Fault-Tolerant Systems; Risk Management; Cyber säkerhet; Resiliens; Industriella Styrsystem; Riskanalys; Electrical Engineering; Elektro- och systemteknik;

    Abstract : Resilience is the ability to maintain acceptable levels of operation in the presence of abnormal conditions. It is an essential property in industrial control systems, which are the backbone of several critical infrastructures. READ MORE

  5. 5. Authentication in Quantum Key Distribution : Security Proof and Universal Hash Functions

    Author : Aysajan Abidin; Jan-Åke Larsson; Viiveke Fåk; Robert Forchheimer; Joseph Merrill Renes; Linköpings universitet; []
    Keywords : ;

    Abstract : Quantum Key Distribution (QKD) is a secret key agreement technique that consists of two parts: quantum transmission and measurement on a quantum channel, and classical post-processing on a public communication channel. It enjoys provable unconditional security provided that the public communication channel is immutable. READ MORE