Sökning: "usernames"

Visar resultat 1 - 5 av 9 uppsatser innehållade ordet usernames.

  1. 1. Anonymization of Sensitive Data through Cryptography

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Isac Holm; Johan Dahl; [2023]
    Nyckelord :Cryptography; Encryption; Decryption; AES; Camellia; Anonymization; Sensitive Data;

    Sammanfattning : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. LÄS MER

  2. 2. The Use of Management Control in Decentralized Autonomous Organizations : A descriptive case study on the use of management control in three Ethereum blockchain based DAOs

    Master-uppsats, Linköpings universitet/Industriell ekonomi

    Författare :Ludvig Öberg; Isak Almquist; [2022]
    Nyckelord :DAO; Decentralized Autonomous Organizations; Management Control; Blockchain; Bitcoin; Ethereum; Smart Contracts; Cryptography; Consensus; Governance; Cryptocurrencies; DAO; Decentraliserade Autonoma Organisationer; Styrning; Blockkedja; Blockkedjor; Bitcoin; Ethereum; Kryptovalutor; Konsensus;

    Sammanfattning : Decentralized autonomous organizations, or DAOs, are spoken highly of in cryptocurrency spaces as a new way of organizing capital and labor. The basic concept is an organization with a shared vision or goal, where the participants and/or outside stakeholders own tokens that grant governing rights over resources through smart contracts. LÄS MER

  3. 3. Beviskraft och EncroChat - Felkällor vid bevisvärdering

    Uppsats för yrkesexamina på avancerad nivå, Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Författare :Vincent Zolotov; [2022]
    Nyckelord :allmän rättslära; jurisprudence; encrochat; bevisvärdering; bevisteori; Law and Political Science;

    Sammanfattning : After the French police managed to gain access to material from the encrypted communication service EncroChat, parts of the material were forwarded to the Swedish police. This resulted in a large number of people being sentenced to long prison terms. LÄS MER

  4. 4. Fan-Identität Erzählen : Shared stories innerhalb der Taylor-Swift-Fangemeinde: Ein small story approach

    Master-uppsats, Stockholms universitet/Institutionen för slaviska och baltiska språk, finska, nederländska och tyska

    Författare :Juliane Rapp; [2021]
    Nyckelord :fan identity; small story paradigm; small stories; shared stories; references; fans; fandom; fan community; identity; performative identity; narrating identity; Taylor Swift; Swifties; social media; social networks; Twitter; Tumblr; nicknames; usernames; Emojis; narratives in interaction; positioning; membership categorization;

    Sammanfattning : Fans and fandoms are ever more salient aspects of our everyday lives offline and linked to the Internet's growing influence also online, particularly on social media. While fans have generally been pathologized via mass media but also early academic representations especially prior to the founding of the interdisciplinary Fan Studies in the 1970s/1980s, which sought to actively counter negative fan representations and foreground fans' creative productivity, nowadays, even though many types of fans have been 'mainstreamed' and are generally accepted, specific fan types are still systematically discriminated against - even within Fan Studies - along the lines of socio-demographic variables. LÄS MER

  5. 5. Digital incursion: Breaching the android lock screen and liberating data

    Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Tim Oskarsson; [2021]
    Nyckelord :Android forensics; Mobile forensics; Memory forensics; Device access; PIN; Pattern; Biometrics; Android Debug Bridge; TWRP; Frida.;

    Sammanfattning : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. LÄS MER