Search for dissertations about: "CAN authentication"
Showing result 1 - 5 of 59 swedish dissertations containing the words CAN authentication.
-
1. Topics in Authentication Theory
Abstract : Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e. READ MORE
-
2. Contributions to Web Authentication for Untrusted Computers
Abstract : Authentication methods offer varying levels of security. Methods with one-time credentials generated by dedicated hardware tokens can reach a high level of security, whereas password-based authentication methods have a low level of security since passwords can be eavesdropped and stolen by an attacker. READ MORE
-
3. Information-theoretic Privacy and Secrecy in Biometric Identification and Authentication
Abstract : Nowadays, biometrics are more and more deployed to reinforce traditional authentication or identification that uses keys, passwords, etc. Biometric identification and authentication have been studied from various information-theoretic perspectives, where privacy and secrecy are two important aspects. READ MORE
-
4. Be More and be Merry: Enhancing Data and User Authentication in Collaborative Settings
Abstract : Cryptography is the science and art of keeping information secret to un-intended parties. But, how can we determine who is an intended party and who is not? Authentication is the branch of cryptography that aims at confirming the source of data or at proving the identity of a person. This Ph.D. READ MORE
-
5. On Some Symmetric Lightweight Cryptographic Designs
Abstract : This dissertation presents cryptanalysis of several symmetric lightweight primitives, both stream ciphers and block ciphers. Further, some aspects of authentication in combination with a keystream generator is investigated, and a new member of the Grain family of stream ciphers, Grain-128a, with built-in support for authentication is presented. READ MORE