Search for dissertations about: "Encryption"

Showing result 1 - 5 of 53 swedish dissertations containing the word Encryption.

  1. 1. Tree Structures in Broadcast Encryption

    Author : Kristin Anderson; Ingemar Ingemarsson; Jacob Löfvenberg; Robert Forchheimer; Ben Smeets; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Broadcast encryption; Subset Difference; tree structure; Information technology; Informationsteknologi;

    Abstract : The need for broadcast encryption arises when a sender wishes to securely distribute messages to varying subsets of receivers, using a broadcast channel, for instance in a pay-TV scenario. This is done by selecting subsets of users and giving all users in the same subset a common decryption key. READ MORE

  2. 2. Guesswork and Entropy as Security Measures for Selective Encryption

    Author : Reine Lundin; Stefan Lindskog; Svein Knapskog; Karlstads universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Computer security; security metrics; selective encryption; confidentiality; entropy; guesswork.; Computer Science; Datavetenskap;

    Abstract : More and more effort is being spent on security improvements in today's computer environments, with the aim to achieve an appropriate level of security. However, for small computing devices it might be necessary to reduce the computational cost imposed by security in order to gain reasonable performance and/or energy consumption. READ MORE

  3. 3. Life of a Security Middlebox : Challenges with Emerging Protocols and Technologies

    Author : Zeeshan Afzal; Stefan Lindskog; Tomas Olovsson; Karlstads universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; network security; TCP; MPTCP; IDS; Snort; edit-distance; encryption; Computer Science; Datavetenskap;

    Abstract : The Internet of today has intermediary devices known as middleboxes that perform more functions than the normal packet forwarding function of a router. Security middleboxes are a subset of these middleboxes and face an increasingly difficult task to perform their functions correctly. READ MORE

  4. 4. Attribute-based Approaches for Secure Data Sharing in Industry

    Author : Alex Chiquito; Ulf Bodin; Olov Schelén; Pál Varga; Luleå tekniska universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Access Control; NGAC; Fine-grained; IoT; Industry 4.0; Encryption; flexible; Cyber-Physical Systems; Cyberfysiska system;

    Abstract : The Industry 4.0 revolution relies heavily on data to generate value, innovation, new services, and optimize current processes [1]. Technologies such as Internet of Things (IoT), machine learning, digital twins, and much more depend directly on data to bring value and innovation to both discrete manufacturing and process industries. READ MORE

  5. 5. Deep Learning Side-Channel Attacks on Advanced Encryption Standard

    Author : Huanyu Wang; Elena Dubrova; Mark Smith; Francesco Regazzoni; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Side-channel attack; Deep learning; Advanced Encryption Standard; Hardware security; Informations- och kommunikationsteknik; Information and Communication Technology;

    Abstract : Side-channel attacks (SCAs) have become one of the most realistic threats to implementations of cryptographic algorithms. By exploiting the nonprime, unintentional physical leakage, such as different amount of power consumed by the device during the execution of the cryptographic algorithm, SCAs are able to bypass the theoretical strength of cryptography and extract the secret key. READ MORE