Sökning: "XML signature and XML encryption"

Visar resultat 6 - 10 av 12 uppsatser innehållade orden XML signature and XML encryption.

  1. 6. Implementing a SOAP security proxy and Evaluating SOAP security standards

    Kandidat-uppsats, Institutionen för datavetenskap

    Författare :Lars Persson; [2012]
    Nyckelord :;

    Sammanfattning : The project had two intended goals. One was to create a prototype for the proxy component of the Secure Webservice Platform system that can function on the GNU/Linux operating system. LÄS MER

  2. 7. Detektering av krypterade filer

    Kandidat-uppsats, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Författare :Linus Barkman; [2011]
    Nyckelord :Encrypted files; encrypted volumes; Computer forensic; EnCase; EnScript; Truecrypt; encrypted storage media; Krypterade filer; krypterade volymer; IT-forensik; EnCase; EnScript; Truecrypt; krypterad lagringsmedia;

    Sammanfattning : In contemporary encryption the vast amount of text subject to cracking has brought about the demand for methods distinguish files more likely to be encrypted. The encryption software Truecrypt can encrypt files that are not possible to identify with a file signature. LÄS MER

  3. 8. Investigation of cryptographic algorithms for the transfer of financial information

    Magister-uppsats, Linnéuniversitetet/Institutionen för datavetenskap, fysik och matematik, DFM

    Författare :Mykola Martynenko; [2010]
    Nyckelord :encryption; cryptography; hashing; client; server; compressing; digital signature;

    Sammanfattning : The purpose of the investigation is to determine the most effective solution, which allows safe storing and transmitting of financial information in terms of execution speed, resistance to hacking and ease of implementation. Research object is subject area related to the transfer of encrypted financial information like: encryption algorithms, algorithm of hashing functions, algorithm of electronic digital signature. LÄS MER

  4. 9. Design and implementation of Wireless Packet Level Authentication

    Master-uppsats,

    Författare :Abdullah Al Hasib; [2009]
    Nyckelord :;

    Sammanfattning : Secure user authentication, authorization and access control have become the major challenges in any wireless security system, often due to certain wireless network characteristics such as lack of infrastructure, low power availability and mobility. Taking advantage of such network characteristics, an attacker can launch several security attacks like Denial of Service (DoS) attacks, packet spoofing and session hijacking attacks. LÄS MER

  5. 10. Security Architecture and Technologies for the Electronic Document Exchange with SOAP as Communication Protocol

    Uppsats för yrkesexamina på grundnivå, Institutionen för systemteknik

    Författare :Marcus Dahlén; [2005]
    Nyckelord :Informationsteknik; SOAP; XML; Web Service; J2EE; security; SSL; MTOM; Risk Assessment; XML Digital Signature; XML Encryption; XKMS; Informationsteknik;

    Sammanfattning : In many industries the tracking and tracing of products within the supply chain is required by law. Companies in the metal working industry exchange so-called material test reports, which specify the product’s properties, the customer’s requirements, and serve as an assurance between the supplier and the customer. LÄS MER