Sökning: "cryptographic protocols"

Visar resultat 1 - 5 av 21 uppsatser innehållade orden cryptographic protocols.

  1. 1. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS

    Uppsats för yrkesexamina på grundnivå, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Krister Georges; Per Jahnstedt; [2023]
    Nyckelord :NETCONF; MbedTLS; YANG; Embedded; SNMP; XML; HMS; IETF; IIoT; ABCC; Wireshark; TLS; Porting; RTOS; IoT; Interoperability; Networking; Security; Protocols; C C ; Embedded Linux; Configuration Management; Microcontroller; Microprocessor; Scalability; Hardware Interfaces; Hardware; Open source; QA; Data Modeling; System Integration; Automation;

    Sammanfattning : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. LÄS MER

  2. 2. Säker nyckelhantering i webbläsaren

    Kandidat-uppsats, Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Författare :Daniel Engman; William Hagman; [2023]
    Nyckelord :WebAuthn; AWS; FIDO; FIDO2; prf; large blob; Knigtech; WebAuthn; AWS; FIDO; FIDO2; prf; large blob; Knigtech;

    Sammanfattning : Idag används vanligtvis lösenord som autentiseringsmetod i moderna applikationer. Men allt fler företag och applikationer övergår från denna metod och i stället använda krypterade nycklar och certifikat för att öka säkerheten. LÄS MER

  3. 3. Securing LwM2M with Mbed TLS in Contiki-NG

    Magister-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Jayendra Ellamathy; [2023]
    Nyckelord :;

    Sammanfattning : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. LÄS MER

  4. 4. Bootstrapping Secure Sensor Networks in the Internet of Things

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Johan Edman; [2022]
    Nyckelord :Internet of Things; Machine-to-machine communications; Internet security; Cryptographic protocols; Sakernas internet; Maskin-till-maskin kommunikation; Säkerhet på internet; Kryptografiska protokoll;

    Sammanfattning : The Internet of Things has become an integral part of modern society and continues to grow and evolve. The devices are expected to operate in various conditions and environments while securely transmitting sensor data and keeping low manufacturing costs. Security for the Internet of Things is still in its infancy and a serious concern. LÄS MER

  5. 5. Improving deep learning assistedfar-field electromagnetic sidechannelattacks on AES : Effects on attack efficiency from using additive noise and otherdata augmentation techniques

    Master-uppsats, KTH/Mekatronik

    Författare :Axel Zedigh; [2022]
    Nyckelord :;

    Sammanfattning : Profiled side-channel attacks on hardware implemented cryptographic algorithms have been a well-researched topic for the past two decades and many countermeasures against these attacks have been proposed and adopted by the industry. Recently, a new form of far field EM side channel called "screaming channel attacks" have been highlighted. LÄS MER