Sökning: "End-to-End encryption"

Visar resultat 1 - 5 av 23 uppsatser innehållade orden End-to-End encryption.

  1. 1. Evaluating intrusion detection points in an end-to-end solution

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Lilla Pankaczi; [2023]
    Nyckelord :RFID; Random UID; Mutual Authentication; Scyther;

    Sammanfattning : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. LÄS MER

  2. 2. En bakdörr till effektiv brottsbekämpning - Straffprocessrättens hindrande av end-to-end-krypterad kommunikation

    Uppsats för yrkesexamina på avancerad nivå, Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Författare :Emma Folkesson; [2023]
    Nyckelord :Straffprocessrätt; IT-rätt; Hemliga tvångsmedel; Krypterade kommunikationstjänster; Chat Control; Hemlig dataavläsning; EU-rätt; Kriminalpolitik; Online Safety Bill; Law and Political Science;

    Sammanfattning : A concerning development of organized crime in Sweden has caused debate about the state's ability to uphold law and order effectively. At the same time, increased access to, and use of, encrypted communication services amongst criminals poses a challenge to law enforcement agencies. LÄS MER

  3. 3. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ossian Dillner; [2023]
    Nyckelord :Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Sammanfattning : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. LÄS MER

  4. 4. Cloud-Based Collaborative Local-First Software

    Master-uppsats, Umeå universitet/Institutionen för datavetenskap

    Författare :Tor Vallin; [2023]
    Nyckelord :Cloud Computing; Local-First Software; End-to-End Encryption; Privacy; Scalability;

    Sammanfattning : Local-first software has the potential to offer users a great experience by combining the best aspects of traditional applications with cloud-based applications. However, not much has been documented regarding developing backends for local-first software, particularly one that is scalable while still supporting end-to-end encryption. LÄS MER

  5. 5. FFS: A cryptographic cloud-based deniable filesystem through exploitation of online web services : Store your sensitive data in plain sight

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Glenn Olsson; [2023]
    Nyckelord :Filesystem; Fejk FileSystem; Cloud-based filesystem; Steganograhpic filesystem; Filsystem; Fejk FileSystem; Molnbaserat filsystem; Steganografiskt filsystem;

    Sammanfattning : Many Online Web Services (OWSs) today, such as Flickr and Twitter, provide users with the possibility to post images that are stored on the platform for free. This thesis explores creating a cryptographically secure filesystem that stores its data on an online web service by encoding the encrypted data as images. LÄS MER