Search for dissertations about: "crypto"

Showing result 1 - 5 of 7 swedish dissertations containing the word crypto.

  1. 1. The Wicked Problem of Privacy : Design Challenge for Crypto-based Solutions

    Author : Ala Sarah Alaqra; Simone Fischer-Hübner; Kovila Coopamootoo; Karlstads universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Data privacy; wicked problems; user-centered design; crypto-based solutions; usability; data minimization; redactable signatures; Computer Science; Datavetenskap;

    Abstract : Data privacy has been growing in importance in recent years, especially with the continuous increase of online activity. Researchers study, design, and develop solutions aimed at enhancing users’ data privacy. The wicked problem of data privacy is a continuous challenge that defies straightforward solutions. READ MORE

  2. 2. Tinkering the Wicked Problem of Privacy : Design Challenges and Opportunities for Crypto-based Services

    Author : Ala Sarah Alaqra; Simone Fischer-Hübner; Erik Wästlund; Steven Furnell; Karlstads universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Data privacy; wicked problems; user-centered design; privacy enhancing technologies; human factors; malleable signatures; secret sharing; homomorphic encryption; Computer Science; Datavetenskap;

    Abstract : Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. READ MORE

  3. 3. Secure and Trusted Mobile Commerce System based on Virtual Currencies

    Author : Ioannis Kounelis; Sead Muftic; Fisseha Mekuria; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; security; secure e-mail; mobile commerce; uicc; crypto currency; Computer Science; Datalogi;

    Abstract : With the widespread usage of mobile devices and their applications, many areas of innovation have created a multitude of opportunities for mobile technologies to be deployed with very interesting effects. One such new area that emerged in the last few years is mobile commerce. READ MORE

  4. 4. Cryptographic Tools for Privacy Preservation

    Author : Carlo Brunetta; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Outsourced Computation; Verifiability; Cryptography; Privacy; Cloud Computing;

    Abstract : Data permeates every aspect of our daily life and it is the backbone of our digitalized society. Smartphones, smartwatches and many more smart devices measure, collect, modify and share data in what is known as the Internet of Things. READ MORE

  5. 5. Proving Safety and Security of Binary Programs

    Author : Andreas Lindner; Roberto Guanciale; Mads Dam; Tamara Rezk; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Binary Code; Binary Analysis; Formal Verification; Model-Based Testing; Theorem Proving; HOL4; Intermediate Language; Instruction Set Architectures; ISA; Observational Models; Symbolic Execution; Weakest-Precondition; Execution Time Analysis; binärkod; binärkodsanalys; formell verifiering; modellbaserad testning; satsbevisning; HOL4; mellankod; instruktionsuppsättningar; ISA; observationsmodeller; symbolisk exekvering; minst restriktiva villkoret; analys av övre tidsgräns; Datalogi; Computer Science;

    Abstract : With the increasing ubiquity of computing devices, their correct and secure operation is of growing importance. In particular, critical components that provide core functionalities or process sensitive data have to operate as intended. READ MORE