Search for dissertations about: "Encryption"
Showing result 1 - 5 of 53 swedish dissertations containing the word Encryption.
-
1. Tree Structures in Broadcast Encryption
Abstract : The need for broadcast encryption arises when a sender wishes to securely distribute messages to varying subsets of receivers, using a broadcast channel, for instance in a pay-TV scenario. This is done by selecting subsets of users and giving all users in the same subset a common decryption key. READ MORE
-
2. Guesswork and Entropy as Security Measures for Selective Encryption
Abstract : More and more effort is being spent on security improvements in today's computer environments, with the aim to achieve an appropriate level of security. However, for small computing devices it might be necessary to reduce the computational cost imposed by security in order to gain reasonable performance and/or energy consumption. READ MORE
-
3. Life of a Security Middlebox : Challenges with Emerging Protocols and Technologies
Abstract : The Internet of today has intermediary devices known as middleboxes that perform more functions than the normal packet forwarding function of a router. Security middleboxes are a subset of these middleboxes and face an increasingly difficult task to perform their functions correctly. READ MORE
-
4. Attribute-based Approaches for Secure Data Sharing in Industry
Abstract : The Industry 4.0 revolution relies heavily on data to generate value, innovation, new services, and optimize current processes [1]. Technologies such as Internet of Things (IoT), machine learning, digital twins, and much more depend directly on data to bring value and innovation to both discrete manufacturing and process industries. READ MORE
-
5. Deep Learning Side-Channel Attacks on Advanced Encryption Standard
Abstract : Side-channel attacks (SCAs) have become one of the most realistic threats to implementations of cryptographic algorithms. By exploiting the nonprime, unintentional physical leakage, such as different amount of power consumed by the device during the execution of the cryptographic algorithm, SCAs are able to bypass the theoretical strength of cryptography and extract the secret key. READ MORE