• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 46
  • 12
  • 8
  • 6
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 85
  • 19
  • 14
  • 14
  • 13
  • 11
  • 11
  • 10
  • 9
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Programinės įrangos ir duomenų saugumas: grėsmės ir jų valdymas, šifravimo algoritmai / Security in Computing: Threats and their Management, Encryption Systems

Valinčius, Tomas 11 August 2008 (has links)
Darbo tikslas – išnagrinėti būdus darbo kompiuteriu keliamoms grėsmėms valdyti: (1) Aptarti, pažinti grėsmes kompiuterinių sistemų saugumui; (2) Suprasti, kas sukelia šias grėsmes, nagrinėjant programinės įrangos kūrimo procesą; (3) Nustatyti būdus, kurie gali sumažinti ar eliminuoti grėsmes. Darbe pirmiausiai aptariamos techninės priežastys, lemiančios saugumo spragų programinėje įrangoje pasirodymą; piktavališkų programų tipai bei jų daroma žala. Toliau aptarti šiuo metu naudojami metodai programinės įrangos saugumui ir kokybei užtikrinti, suformuluoti pagrindiniai saugios programinės įrangos kūrimo principai. Kadangi duomenys yra viena iš trijų kompiuterinės sistemos sudedamųjų dalių (programinė įranga, techninė įranga, duomenys), svarbią dalį darbe užima informacijos slaptumo, konfidencialumo užtikrinimo problema. Aptarti pagrindiniai dalykai, užtikrinantys asmens privatumą darbo kompiuteriu metu; pasiūlyti būdai, kaip tinkamai saugoti privačius/slaptus duomenis; paminėtos teisinės priemonės šioje srityje. Taip pat aptarti saugaus darbo internete principai. Saugumui užtikrinti labai svarbūs organizaciniai veiksniai. Šiame darbe aptartos organizacinės priemonės duomenų bei programinės įrangos saugumui užtikrinti, saugumo politika, grėsmių analizės priemonės. Darbe taip pat išnagrinėti šifravimo ir dešifravimo algoritmai – pagrindinės techninės priemonės daugeliui su saugumu susijusių problemų spręsti. Aptarti ne tik šiuo metu naudojami, bet ir patys pirmieji šifravimo... [toliau žr. visą tekstą] / Is security in computing a problem? There are many methods and ways developed to help in software quality management. However, the need to quickly release a new software or its version is often more important than software security requirements or threats analysis. The main goal of this work is to analyse the threats in computing and methods to manage software security. The main objectives are: (1) To recognize and discuss the threats in computing; (2) To find the reasons that are causing security problems while studying the software development process; (3) To find ways to eliminate the threats or minimize their impact. First of all, there is a study of technical reasons that are causing vulnerabilities and threats in software to appear. Then there is a review of existing methods to manage software security and quality. An important part of this work is dedicated to privacy, private data management problem. There are methods discussed that ensures privacy in computing. After the review of technical aspects of security, there are methods discussed that insures security from organization’s point of view. Finally, there is a review of encryption systems, there types, differences and measures.
52

Enhancing information security and privacy by combining biometrics with cryptography

KANADE, Sanjay Ganesh 20 October 2010 (has links) (PDF)
Securing information during its storage and transmission is an important and widely addressed issue. Generally, cryptographic techniques are used for information security. Cryptography requires long keys which need to be kept secret in order to protect the information. The drawback of cryptography is that these keys are not strongly linked to the user identity. In order to strengthen the link between the user's identity and his cryptographic keys, biometrics is combined with cryptography. In this thesis, we present various methods to combine biometrics with cryptography. With this combination, we also address the privacy issue of biometric systems: revocability, template diversity, and privacy protection are added to the biometric verification systems. Finally, we also present a protocol for generating and sharing biometrics based crypto-biometric session keys. These systems are evaluated on publicly available iris and face databases
53

As criptojudias e suas práticas culturais no final do século XVI (Pernambuco, Itamaracá e Paraíba).

ANDRADE, Priscila Gusmão. 14 May 2018 (has links)
Submitted by Lucienne Costa (lucienneferreira@ufcg.edu.br) on 2018-05-14T18:56:15Z No. of bitstreams: 1 PRISCILA GUSMÃO ANDRADE – DISSERTAÇÃO (PPGH) 2017.pdf: 1507267 bytes, checksum: 810ce681c3f0713c269ba91845ac5d52 (MD5) / Made available in DSpace on 2018-05-14T18:56:15Z (GMT). No. of bitstreams: 1 PRISCILA GUSMÃO ANDRADE – DISSERTAÇÃO (PPGH) 2017.pdf: 1507267 bytes, checksum: 810ce681c3f0713c269ba91845ac5d52 (MD5) Previous issue date: 2017 / Este trabalho procura trazer as vivências cotidianas e as táticas das criptojudias portuguesas no período em que o Visitador do Tribunal do Santo Ofício da Inquisição portuguesa chega pela primeira vez as Capitanias de Pernambuco, Itamaracá e Paraíba, entre os anos de 1593 a 1595. Buscando problematizar as práticas culturais de origem judaica que se apresentavam nas denúncias que chegaram a mesa do representante inquisitorial, Heitor Furtado de Mendonça, contra essas mulheres. Em um primeiro momento buscamos compreender a relação entre a figura do cristão novo e a implantação do Tribunal inquisitorial em Portugal, analisando os estigmas que recaiam sobre esse grupo no país. Para, por conseguinte trabalharmos as formas de vivências que se constroem entre os grupos de cristãos velhos e cristãos novos no Brasil de fins do século XVI e o papel reservado para a figura feminina no projeto de colonização portuguesa, abordando e destacando as suas burlas que eram exercidas na vivência do dia-a-dia. A fonte de origem Inquisitorial; tanto as denuncias e confissões feitas ao Visitador, como alguns processos que foram resultado dessa visitação, são de primordial importância para a construção desse trabalho. / This work seeks to bring the daily experiences and tactics of the Portuguese Crypto-Jews in the period in which the Visitor of the Tribunal of the Holy Office of the Portuguese Inquisition arrives for the first time the Captaincies of Pernambuco, Itamaracá and Paraíba, between the years of 1593 to 1595.Seeking to problematize the cultural practices of Jewish origin that appeared in the denunciations that arrived at the table of the inquisitorial representative, Heitor Furtado de Mendonça, against these women. At first, we sought to understand the relationship between the figure of the new Christian and the establishment of the Inquisitorial Tribunal in Portugal, analyzing the stigmas that fall on this group in the country. To work, therefore, on the forms of living that are built between the groups of old and new christians in Brazil at the end of the sixteenth century and the role reserved for the female figure in the Portuguese colonization project, addressing and highlighting their mockery that was exercised in the daily life. The source of Inquisitorial origin; Both the denunciations and confessions made to the Visitor, and some processes that resulted from this visitation, are of prime importance for the construction of this work.
54

Perfil dos investidores de criptomoedas: análise de buscas correlacionadas ao Bitcoin

Carvalho, Davi Torres de 31 July 2018 (has links)
Submitted by Davi Torres de Carvalho (davi.torres@gmail.com) on 2018-08-30T14:14:52Z No. of bitstreams: 1 PERFIL DOS INVESTIDORES DE CRIPTOMOEDAS - ANÁLISE DE BUSCAS CORRELACIONADAS AO BITCOIN.pdf: 1321448 bytes, checksum: d7e782a8be37d95ad193a89108224ae8 (MD5) / Approved for entry into archive by Joana Martorini (joana.martorini@fgv.br) on 2018-08-30T14:24:27Z (GMT) No. of bitstreams: 1 PERFIL DOS INVESTIDORES DE CRIPTOMOEDAS - ANÁLISE DE BUSCAS CORRELACIONADAS AO BITCOIN.pdf: 1321448 bytes, checksum: d7e782a8be37d95ad193a89108224ae8 (MD5) / Rejected by Suzane Guimarães (suzane.guimaraes@fgv.br), reason: Prezado Davi O seu trabalho foi rejeitado pois o título que consta nele está diferente do título autorizado pela banca examinadora, sendo assim é necessário fazer a correção e submeter o arquivo novamente. Quaisquer dúvidas entrar em contato com o telefone 11 3799-7732. Atenciosamente, on 2018-08-30T14:52:44Z (GMT) / Submitted by Davi Torres de Carvalho (davi.torres@gmail.com) on 2018-08-30T18:31:17Z No. of bitstreams: 1 PERFIL DOS INVESTIDORES DE CRIPTOMOEDAS - ANÁLISE DE BUSCAS CORRELACIONADAS AO BITCOIN.pdf: 1321448 bytes, checksum: d7e782a8be37d95ad193a89108224ae8 (MD5) / Approved for entry into archive by Joana Martorini (joana.martorini@fgv.br) on 2018-08-30T18:43:52Z (GMT) No. of bitstreams: 1 PERFIL DOS INVESTIDORES DE CRIPTOMOEDAS - ANÁLISE DE BUSCAS CORRELACIONADAS AO BITCOIN.pdf: 1321448 bytes, checksum: d7e782a8be37d95ad193a89108224ae8 (MD5) / Approved for entry into archive by Suzane Guimarães (suzane.guimaraes@fgv.br) on 2018-08-31T12:02:00Z (GMT) No. of bitstreams: 1 PERFIL DOS INVESTIDORES DE CRIPTOMOEDAS - ANÁLISE DE BUSCAS CORRELACIONADAS AO BITCOIN.pdf: 1321448 bytes, checksum: d7e782a8be37d95ad193a89108224ae8 (MD5) / Made available in DSpace on 2018-08-31T12:02:00Z (GMT). No. of bitstreams: 1 PERFIL DOS INVESTIDORES DE CRIPTOMOEDAS - ANÁLISE DE BUSCAS CORRELACIONADAS AO BITCOIN.pdf: 1321448 bytes, checksum: d7e782a8be37d95ad193a89108224ae8 (MD5) Previous issue date: 2018-07-31 / O Bitcoin é a maior criptomoeda em valor de mercado (USD 140 bilhões) e volume de negócios diário (USD 5,7 bilhões) de um grande grupo de criptomoedas. Sua proposta é baseada em uma rede ponto a ponto para permitir que pagamentos online sejam enviados diretamente de uma parte para outra sem passar por uma instituição financeira. Essa proposta também se apresenta como método seguro para evitar o duplo gasto e proteger a rede de ataques cibernéticos. O Bitcoin também usa um sistema de incentivo para a manutenção da rede. Neste artigo, é possível compreender suas características técnicas, bem como analisar a evolução histórica do Bitcoin, incluindo alguns aspectos financeiros como investimento. O principal objetivo é analisar os dados do Google Trends, onde a quantidade de pesquisas correlacionadas ao Bitcoin é usada para encontrar os perfis de investidores que buscaram Bitcoin na internet. Alguns termos como 'mineração', 'mercado' e 'programação de computadores' tiveram uma associação positiva com o interesse do Bitcoin (medido pela quantidade de buscas). Por outro lado, a associação com o termo 'dólar' foi negativa. Os efeitos placebo relativos aos cantores 'Caetano Veloso' e 'Roberto Carlos' não foram significativos. / Bitcoin is the largest cryptocurrency in terms of total market value (USD 140 billion) and daily traded volume (USD 5.7 billion). Its solution is based on a peer-to-peer network to enable online payments to be sent directly from one party to another without going through financial institutions. This proposal presents itself as a safe method to avoid double expenses and to protect the network from cyber attacks. Bitcoin also uses an incentive system for the maintenance of the network. In this article, it is possible to understand its technical characteristics as well as analyze the historical evolution of the bitcoin, including some financial aspects as an investment. The main objective is to analyze the data from Google Trends where the quantity of searches correlated to Bitcoin is used to find the profiles of investors that looked up to bitcoin on the internet. Some terms as 'mining', 'market', and 'computer programming' had a positive association with Bitcoin's interest (measured by the quantity of searches). On the other hand, the association with the term 'dollar' was negative. The placebo effects relative to the singers 'Caetano Veloso' and 'Roberto Carlos' were not significant.
55

Implications of Non-Fungible Tokens for the Online Artist

Hrenyak, Alexia January 2022 (has links)
Non-fungible tokens, or NFTs, are unique virtual tokens which are stored on a blockchain and can be linked to a wide range of digital and physical assets. In the online art world, NFTs are meant to function as digital certificates of authenticity and ownership, facilitating provenance research and introducing the notion of scarcity to the digital realm. However, the long-term sustainability of NFTs is threatened by their association to art theft, scams, and negative environmental impact. This qualitative study investigates the effects that non-fungible tokens have had on the work of online visual artists. With the goal of presenting multiple perspectives on a complex phenomenon, semi-structured interviews were conducted both with artists who personally create NFTs of their artwork and with artists whose art was tokenized by others without their permission. The results of the study reveal that NFTs appear as a possible path towards financial freedom for artists and a democratization of the arts. At the same time, a reoccurring point of concern is that online social media platforms and NFT marketplaces largely fail to protect artists against NFT-related art theft. Based on the answers collected from the interviews, this study presents several potential measures that could help combat plagiarism and scamming. Finally, the issue of widespread ignorance and misinformation is discussed, highlighting the need for more reliable, unbiased resources on the topic of NFTs.
56

Evaluation of Security in Hadoop

Tabatabaei, Mahsa January 2015 (has links)
There are different ways to store and process large amount of data. Hadoop iswidely used, one of the most popular platforms to store huge amount of dataand process them in parallel. While storing sensitive data, security plays animportant role to keep it safe. Security was not that much considered whenHadoop was initially designed. The initial use of Hadoop was managing largeamount of public web data so confidentiality of the stored data was not anissue. Initially users and services in Hadoop were not authenticated; Hadoop isdesigned to run code on a distributed cluster of machines so without properauthentication anyone could submit code and it would be executed. Differentprojects have started to improve the security of Hadoop. Two of these projectsare called project Rhino and Project Sentry [1].Project Rhino implements splittable crypto codec to provide encryptionfor the data that is stored in Hadoop distributed file system. It also developsthe centralized authentication by implementing Hadoop single sign on whichprevents repeated authentication of the users accessing the same services manytimes. From the authorization point of view Project Rhino provides cell-basedauthorization for Hbase [2].Project Sentry provides fine-grained access control by supporting role-basedauthorization which different services can be bound to it to provide authorizationfor their users [3].It is possible to combine security enhancements which have been done inthe Project Rhino and Project Sentry to further improve the performance andprovide better mechanisms to secure Hadoop.In this thesis, the security of the system in Hadoop version 1 and Hadoopversion 2 is evaluated and different security enhancements are proposed, consideringsecurity improvements made by the two aforementioned projects, ProjectRhino and Project Sentry, in terms of encryption, authentication, and authorization.This thesis suggests some high-level security improvements on theCentralized authentication system (Hadoop Single Sign on) implementationmade by Project Rhino.
57

Decentraliserat portföljval : Kryptotillgångar som diversifiering vid portföljoptimering / Decentralized portfolioselection : Crypto assets as diversification in portfolio-optimization

Jämte, Marcus, Rettig, Philip January 2021 (has links)
Kryptomarknaden och decentraliserad finans har under det senaste året med sin höga avkastning dragit till sig mycket uppmärksamhet. Decentraliserade tillgångar blir alltmer attraktiva för investerare och i denna uppsats är undersöks kryptotillgångars egenskaper som hedge eller diversifiering i en portfölj. Hög avkastning och hög risk går allt som oftast hand i hand och i denna uppsats använder undersöker vi dynamisk villkorlig korrelation (DCC-GARCH), regressionsmodeller samt portföljers prestation över tid för att undersöka ifall de två största kryptotillgångarna, Bitcoin och Ethereum indikeras vara ett bra alternativ för en investerare att diversifiera sin portfölj med. Undersökningen av korrelationen för Bitcoin och Ethereum gentemot de vanliga tillgångarna (S&P500, guld, olja, inflation) visade på en stabil men svag (0.00-0.19) till mycket svag (0.20-0.40) positiv korrelation över tid. Korrelation inbördes mellan Bitcoin och Ethereum visades vara stark. Resultatet ur regressionen innehållandes Bitcoin, S&P500, Olja och Guld visade på att det existerar ett långsiktigt jämviktsförhållande mellan variablerna, däremot påträffas inget sådant när Ethereum tar Bitcoins plats som beroendevariabel. Portföljernas som undersöktes förändrade fördelningen mellan tillgångarna varje månad med restriktionen att nå de bästa sharpekvoten, utan att ha mindre än 2%, eller mer än 40% av någon tillgång. Resultatet visade att portföljerna som innehöll kryptotillgångarna hade en högre sharpekvot, samt även en högre överavkastning till en likvärdig risk gentemot de andra tillgångarna samt att sharpekvoten och överavkastningen ökade vid diversifiering inom kryptotlillgångar, men att risken var relativt oförändrad. Resultaten indikerar att kryptotillgångar fungerar bra som diversifiering, dock så finns det inget som pekar på att de skulle agera som hedge emot de undersökta tillgångarna. Nämnvärt är även att korrelationerna mellan kryptotillgångar och de traditionella tillgångar som undersöktes har varit stabil över den undersökta tidsperioden.
58

Minnet sviker Aldrig : Att utnyttja volatil data i Krypterade system

Ringmann, Björn, Hildeblom, Peter January 2014 (has links)
When the use of encryption amongst the regular computer user grows morewidespread than ever it makes the life of the IT-forensics experts difficult.Hampering the judicial investigations that otherwise could have lead to convictions. In this report we will treat the subject of crypto analysis with a focus on decrypting files and devices encrypted with the software TrueCrypt. A solution will be presented that can facilitate the future work involving encryption. The application DFEAT that has been developed during the writings of this report is faster than the corresponding software EFDD, and attacks both partitions and bitwise copies of entire harddrives where PKF fails.DFEAT is a lightweight application that is almost 50 times smaller compared to EFDD and 200 times smaller than PKF's portable version.
59

Anti-Money Laundering Compliance When Dealing with (Art) NFTs

Uhink, Konrad, Gruel, Hendrik, Neuhaus, Yannick 28 November 2023 (has links)
The article discusses the intersection of anti-money laundering (AML) compliance and the handling of Non-Fungible Tokens (NFTs) under German law or EU law applicable in Germany. It begins by acknowledging the negative perception of cryptocurrencies in the context of money laundering, emphasizing the need to explore AML regulations for NFTs, which have gained attention for tokenizing art. The text delves into the legal nature of NFTs, examining whether they can be classified as securities, asset investments, or crypto assets. It also explores the implications of these classifications on AML compliance, detailing the specific obligations for entities dealing with NFTs. The article concludes by highlighting the legal ambiguity surrounding NFTs and emphasizing the importance of conducting a case-by-case risk assessment for AML compliance.
60

Locating the Unlocated : An Examination of Choice of Law and Consumer Protection in Cryptocurrency Trading

Fernandez Gomero, Laura January 2023 (has links)
Disputes involving emerging technology, often leave a grey area on applicable law, as it is unlocated in the physical world. The problem with crypto-assets is partly driven by their underlying technology, allowing for the assets to be distributed in an international, digital sphere, and making it hard to pinpoint their territorial location and solve legal issues. This thesis, therefore, aims to clarify the questions of qualification and connecting factors for the choice of law when dealing with disputes concerning crypto-assets under a cross-border contractual agreement. It particularly seeks to examine consumer protection and the predictability of the choice of law in cryptocurrency trading. The thesis concludes that, for some specifically listed contracts, the applicable law is determined through hard and fast rules, but for other more complex contracts, the applicable law is determined by primarily examining the habitual residence of the operator of the characteristic performance, and secondarily, the closest connection. As to consumer contracts, a special rule appoints the law of the country where the consumer has his habitual residence, but only when several requirements are met. The rules pose problems with predictability and finding a territorial connection when the location of the assets or parties cannot be located. It is particularly a problem in decentralized cryptocurrency exchanges. Regarding the qualification, the thesis concludes that the current rules and statements do not provide a definite answer to the characterization of crypto-assets and require technically complex interpretations. Crypto-assets are mainly categorized based on their purpose, and the parties’ expectations. Therefore, fictional objectification of cryptocurrencies as movable property is possible when accepted as such by the parties. Moreover, cryptocurrency trading does not fall within traditional financial regulations but can be categorized as a service where the coins constitute a means of payment. Although the views are divided, causing uncertainty in the market, the obligations of traders are expected to be clarified through upcoming regulations.

Page generated in 0.1007 seconds