Sökning: "Storage of encryption keys in devices"
Hittade 5 uppsatser innehållade orden Storage of encryption keys in devices.
1. Undersökning och design av en säkerhetslösning för en molnlagringstjänst
Master-uppsats, KTH/Skolan för datavetenskap och kommunikation (CSC)Sammanfattning : Troligen har de allra flesta hört talas ”molnet” eller molnlagring. Molnlagring är populärt och användbart för att säkerhetskopiera, dela och göra information lättåtkomligt från flera enheter. LÄS MER
2. KeySafe The platform-independent password safe with external security
Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : Storing and accessing sensitive data has become an important task in today’s society. Many different services require login credentials for users to remember in order to authenticate themselves. A common habit is to use the same password for several services. LÄS MER
3. Cloud computing from a privacy perspective
Kandidat-uppsats, Institutionen för datavetenskapSammanfattning : The cloud could simplifies the everyday life of private individuals as well as big enterprises by renting out recourses. Resources such as storage capacity, computational power or cloud-based applications could be accessed without the need to invest in expensive infrastructure. LÄS MER
4. Securing Distributed Context Exchange Networks in Mobile Environments
Master-uppsats, Avdelningen för informations- och kommunikationssystemSammanfattning : The use of the internet has exploded with many more context aware applications for different services, simplifying the use and access for human requirements. The present situation shows an increasing number of devices from computers to sensors and actuators that are connected to the internet. LÄS MER
5. Secure storage of encryption keys
Magister-uppsats, Institutionen för systemteknikSammanfattning : The purpose of this thesis work was to make a survey of presently existing devices available in the market to store encryption keys; how the hacker intrudes into the device; what are the attacks behind theft of the keys; how can we store encryption keys securely? To achieve this purpose, an overview of the storage devices and attacks made by hackers was acquired through academic books and papers, Internet sites and magazines. Basic cryptography and related algorithms were studied for the purpose of knowing how the encryption key is generated from these algorithms. LÄS MER