Search for dissertations about: "Homomorphic Encryption"

Showing result 1 - 5 of 6 swedish dissertations containing the words Homomorphic Encryption.

  1. 1. Decentralized Application Security

    Author : Per Hallgren; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Decentralization; Homomorphic Encryption; Location-Based Services; Privacy;

    Abstract : On the internet today, everything is centralized. For most people, a single commercial entity owns the power to disclose all their personal emails. Most commonly your emails are only disclosed to you and your correspondent, but the power to choose who sees these emails is in fact not yours. READ MORE

  2. 2. Tinkering the Wicked Problem of Privacy : Design Challenges and Opportunities for Crypto-based Services

    Author : Ala Sarah Alaqra; Simone Fischer-Hübner; Erik Wästlund; Steven Furnell; Karlstads universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Data privacy; wicked problems; user-centered design; privacy enhancing technologies; human factors; malleable signatures; secret sharing; homomorphic encryption; Computer Science; Datavetenskap;

    Abstract : Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. READ MORE

  3. 3. On equuality testing protocols and their security

    Author : Anna Redz; KTH; []
    Keywords : ;

    Abstract : This thesis is written for the Swedish degree Licentiate ofScience, Teknisk Licentiat.It is a university degree, between that of master andthat of doctor.The main focus of the thesis is on the construction ofsecure protocols for comparing the underlying plain-texts inElGamal encryptions. READ MORE

  4. 4. Robust location privacy

    Author : Per Hallgren; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY;

    Abstract : The Internet is in many ways both fascinating and yet also scary. For most people, a single commercial entity owns the power to disclose all their personal emails. Most commonly your emails are only disclosed to you and your correspondent, but the power to choose who sees these emails is in fact not yours. READ MORE

  5. 5. Defense of Cyber-Physical Systems Against Learning-based Attackers

    Author : Rijad Alisic; Henrik Sandberg; Karl H. Johansson; Miroslav Pajic; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Control Theory; Security; Privacy; Machine Learning; Cyber-Physical Systems; Change Point Problems; Electrical Engineering; Elektro- och systemteknik;

    Abstract : Cyberattacks against critical infrastructures pose a serious threat to society, as they can have devastating consequences on the economy, security, or public health. These infrastructures rely on a large network of cyber components, such as sensors, controllers, computers, and communication devices, to monitor and control their physical processes. READ MORE