Search for dissertations about: "evaluate information security"
Showing result 11 - 15 of 65 swedish dissertations containing the words evaluate information security.
-
11. Design and Security Analysis of TRNGs and PUFs
Abstract : True Random Number Generators (TRNGs) and Physical Unclonable Functions (PUFs) are two important types of cryptographic primitives. TRNGs create a hardware-based, non-deterministic noise that is often used for generating keys, initialization vectors, and nonces for various applications that require cryptographic protection. READ MORE
-
12. Secure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure
Abstract : Vehicular Communication (VC) systems can greatly enhance road safety and transportation efficiency. Vehicles are equipped with sensors to sense their surroundings and the internal Controller Area Network (CAN) bus. Hence, vehicles are becoming part of a large-scale network, the so-called Internet of Vehicles (IoV). READ MORE
-
13. Usability of Firewall Configuration : Making the Life of System Administrators Easier
Abstract : Firewalls are an important component of network security that serve to protect networks by regulating incoming and outgoing traffic. However, setting up firewalls correctly is a challenging task, which becomes more difficult with the growth of the network's size. READ MORE
-
14. Guesswork and Entropy as Security Measures for Selective Encryption
Abstract : More and more effort is being spent on security improvements in today's computer environments, with the aim to achieve an appropriate level of security. However, for small computing devices it might be necessary to reduce the computational cost imposed by security in order to gain reasonable performance and/or energy consumption. READ MORE
-
15. The Hole Story: Type-Directed Synthesis and Repair
Abstract : Modern programs in languages like Haskell include a lot of information beyond what is strictly required for compilation, such as additional type information, unit tests and properties. This information is often used for post-compilation verification, by running the tests to verify that the code-as-written matches the specification provided by the types and properties. READ MORE