Sökning: "merkle tree"
Visar resultat 1 - 5 av 10 uppsatser innehållade orden merkle tree.
1. LF-PKI: Practical, Secure, and High-Performance Design and Implementation of a Lite Flexible PKI
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Today’s Web Public Key Infrastructure (PKI) builds on a homogeneous trust model. All Certificate Authorities (CAs) are equally trusted once they are marked as trusted CAs on the client side. As a result, the security of the Web PKI depends on the weakest CA. LÄS MER
2. Keeping an Indefinitely Growing Audit Log
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. LÄS MER
3. Design and Implementation of A Smart Grid System Based on Blockchain Smart Contract Technology
Kandidat-uppsats, Mittuniversitetet/Institutionen för informationssystem och –teknologiSammanfattning : Under de senaste åren har blockchain-tekniken fått mer och mer uppmärksamhet. Det har visat speciella fördelar i digital valuta, eftersom det distribueras och dess data inte kan ändras. Med fler länder som presenterar idén om kraftsysteminnovationen har ett stort antal distribuerade kraftkällor dykt upp. LÄS MER
4. Using Hash Trees for Database Schema Inconsistency Detection
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : For this work, two algorithms have been developed to improve the performance of the inconsistency detection by using Merkle trees. The first builds a hash tree from a database schema version, and the second compares two hash trees to find where changes have occurred. LÄS MER
5. Distributed Client Driven Certificate Transparency Log
Kandidat-uppsats, Linköpings universitet/Institutionen för datavetenskapSammanfattning : High profile cyber attacks such as the one on DigiNotar in 2011, where a Certificate Authority (CA) was compromised, has shed light on the vulnerabilities of the internet. In order to make the internet safer in terms of exposing fraudulent certificates, CertificateTransparency (CT) was introduced. LÄS MER