• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 13
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 28
  • 11
  • 10
  • 9
  • 9
  • 7
  • 7
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Utilização de mensagens criptografadas no ensino de matrizes

Oliveira, Reinaldo Donizete de 21 March 2013 (has links)
Made available in DSpace on 2016-06-02T20:29:21Z (GMT). No. of bitstreams: 1 5047.pdf: 7174607 bytes, checksum: 837e7cc228e4843dda4ee2007b2c7c55 (MD5) Previous issue date: 2013-03-21 / The present work aims at showing the development and implementation of a Didactic Engineering on the use of encrypted messages in teaching matrices to students who are attending the second high school year at Esmeralda Soares Ferraz School in the City of Ourinhos-SP. This work begins with a question related to the discouragement and apathy of students in studying mathematics and suggests, taking the teaching of matrices through encrypted messages by transposition of letters, a different approach from those commonly applied, through which, the student eager to solve them, will get engaged and interested in learning, in a simple way, the concepts of matrices and transposed matrices, being protagonist of his/her search for knowledge. / O presente trabalho tem como objetivo mostrar a elaboração e realização de uma Engenharia Didática sobre o uso de mensagens criptografadas no ensino de matrizes com alunos do 2o ano do Ensino Médio da Escola Esmeralda Soares Ferraz na Cidade de Ourinhos-SP. Esse trabalho inicia-se com um questionamento sobre o desânimo e a apatia dos alunos em estudar Matemática e sugere, abordando o ensino de matrizes através de mensagens criptografadas por transposição de letras, uma abordagem diferente daquela aplicada no cotidiano, através da qual, o aluno, no anseio de solucioná-las, se empenhe e se interesse em aprender de forma simples os conceitos de matrizes e matrizes transpostas, sendo protagonista de sua busca pelo conhecimento.
12

Šifrované souborové systémy / Encrypted File Systems

Hlavinka, Michal January 2008 (has links)
This thesis is about encrypted filesystems and is aimed mainly for Linux solutions. At first there is explained why is it necessary to encrypt your data at all. Next is written about pros and cons of encrypting methods such as whole disk encryption, partition encryption, container encryption and file encryption. After the introduction there are mentioned most common security issues which can help attacker to decrypt your data or modify them. Furthermore this thesis contains short description about the most often used encrypted filesystems. There is also small how-to for the most important encrypted filesystems available in Linux and comparison of their speed. Next part of this thesis contains dm-crypt and LUKS description. In the last chapter all information are concluded. There is also mentioned benefit of this work and possibilities, what can be done in future.
13

On Reverse Engineering of Encrypted High Level Synthesis Designs

Joshi, Manasi 02 November 2018 (has links)
No description available.
14

Encrypted Traffic Analysis on Smart Speakers with Deep Learning

Kennedy, Sean M. 21 October 2019 (has links)
No description available.
15

Towards Real-World Adversarial Examples in AI-Driven Cybersecurity

Liu, Hao January 2022 (has links)
No description available.
16

State-of-the-art Intrusion Detection: Technology, Challenges, and Evaluation.

Peddisetty, Naga Raju January 2005 (has links)
<p>Due to the invention of automated hacking tools, Hacking is not a black art anymore. Even script kiddies can launch attacks in few seconds. Therefore, there is a great emphasize on the Security to protect the resources from camouflage. Intrusion Detection System is also one weapon in the security arsenal. It is the process of monitoring and analyzing information sources in order to detect vicious traffic. With its unique capabilities like monitoring, analyzing, detecting and archiving, IDS assists the organizations to combat against threats, to have a snap-shot of the networks, and to conduct Forensic Analysis. Unfortunately there are myriad products inthe market. Selecting a right product at time is difficult. Due to the wide spread rumors and paranoia, in this work I have presented the state-of-the-art IDS technologies, assessed the products, and evaluated. I have also presented some of the novel challenges that IDS products are suffering. This work will be a great help for pursuing IDS technology and to deploy Intrusion Detection Systems in an organization. It also gives in-depth knowledge of the present IDS challenges.</p>
17

Towards secure computation for people

Issa, Rawane 23 June 2023 (has links)
My research investigates three questions: How do we customize protocols and implementations to account for the unique requirement of each setting and its target community, what are necessary steps that we can take to transition secure computation tools into practice, and how can we promote their adoption for users at large? In this dissertation I present several of my works that address these three questions with a particular focus on one of them. First my work on "Hecate: Abuse Reporting in Secure Messengers with Sealed Sender" designs a customized protocol to protect people from abuse and surveillance in online end to end encrypted messaging. Our key insight is to add pre-processing to asymmetric message franking, where the moderating entity can generate batches of tokens per user during off-peak hours that can later be deposited when reporting abuse. This thesis then demonstrates that by carefully tailoring our cryptographic protocols for real world use cases, we can achieve orders of magnitude improvements over prior works with minimal assumptions over the resources available to people. Second, my work on "Batched Differentially Private Information Retrieval" contributes a novel Private Information Retrieval (PIR) protocol called DP-PIR that is designed to provide high throughput at high query rates. It does so by pushing all public key operations into an offline stage, batching queries from multiple clients via techniques similar to mixnets, and maintain differential privacy guarantees over the access patterns of the database. Finally, I provide three case studies showing that we cannot hope to further the adoption of cryptographic tools in practice without collaborating with the very people we are trying to protect. I discuss a pilot deployment of secure multi-party computation (MPC) that I have done with the Department of Education, deployments of MPC I have done for the Boston Women’s Workforce Council and the Greater Boston Chamber of Commerce, and ongoing work in developing tool chain support for MPC via an automated resource estimation tool called Carousels.
18

Enablers in criminal networks : An analysis of court cases involving encrypted chats

Thunberg, Hillevi January 2024 (has links)
Criminality related to organized crime and criminal networks, with gun violence, bombings, drug trafficking and money laundering, is a growing problem in Sweden. Many of these crimes are made possible through the network's links to legitimate businesses and the use of enablers - a field of research which has been historically underwhelming - but that is now starting to spark the interest of researchers and politicians alike. This thesis explores the phenomenon of these enablers in organized crime and criminal networks. The data consisted of a large sample of Swedish court documents that contain the verdicts derived from the encrypted chat services Anom, Encrochat and SkyECC. The aim of this thesis was to investigate the connections between individuals involved in organized crime and legitimate businesses. The results showed that 42 percent of the analysed cases contained enablers. A majority of the crimes that involved one or more enablers also involved narcotics, and that the legitimate businesses linked to the enablers were companies operating in professions such as the transportation sector, auto shops, exchange offices, law enforcement, storage or moving. Professional drivers were the most frequently prosecuted persons in the convictions, followed by business owners. Common themes for how the enablers presented in the material were related to the drug trafficking process and storing process. The results tell us that the use of enablers seem to be a relatively common aspect of organized crime operations and that it is, as previous research suggests, likely a problem that will only grow.
19

State-of-the-art Intrusion Detection: Technology, Challenges, and Evaluation.

Peddisetty, Naga Raju January 2005 (has links)
Due to the invention of automated hacking tools, Hacking is not a black art anymore. Even script kiddies can launch attacks in few seconds. Therefore, there is a great emphasize on the Security to protect the resources from camouflage. Intrusion Detection System is also one weapon in the security arsenal. It is the process of monitoring and analyzing information sources in order to detect vicious traffic. With its unique capabilities like monitoring, analyzing, detecting and archiving, IDS assists the organizations to combat against threats, to have a snap-shot of the networks, and to conduct Forensic Analysis. Unfortunately there are myriad products inthe market. Selecting a right product at time is difficult. Due to the wide spread rumors and paranoia, in this work I have presented the state-of-the-art IDS technologies, assessed the products, and evaluated. I have also presented some of the novel challenges that IDS products are suffering. This work will be a great help for pursuing IDS technology and to deploy Intrusion Detection Systems in an organization. It also gives in-depth knowledge of the present IDS challenges.
20

PRACTICAL CONFIDENTIALITY-PRESERVING DATA ANALYTICS IN UNTRUSTED CLOUDS

Savvas Savvides (9113975) 27 July 2020 (has links)
<div> <div> <div> <p>Cloud computing offers a cost-efficient data analytics platform. This is enabled by constant innovations in tools and technologies for analyzing large volumes of data through distributed batch processing systems and real-time data through distributed stream processing systems. However, due to the sensitive nature of data, many organizations are reluctant to analyze their data in public clouds. To address this stalemate, both software-based and hardware-based solutions have been proposed yet all have substantial limitations in terms of efficiency, expressiveness, and security. In this thesis, we present solutions that enable practical and expressive confidentiality- preserving batch and stream-based analytics. We achieve this by performing computations over encrypted data using Partially Homomorphic Encryption (PHE) and Property-Preserving Encryption (PPE) in novel ways, and by utilizing remote or Trusted Execution Environment (TEE) based trusted services where needed.</p><p><br></p><p>We introduce a set of extensions and optimizations to PHE and PPE schemes and propose the novel abstraction of Secure Data Types (SDTs) which enables the application of PHE and PPE schemes in ways that improve performance and security. These abstractions are leveraged to enable a set of compilation techniques making data analytics over encrypted data more practical. When PHE alone is not expressive enough to perform analytics over encrypted data, we use a novel planner engine to decide the most efficient way of utilizing client-side completion, remote re-encryption, or trusted hardware re-encryption based on Intel Software Guard eXtensions (SGX) to overcome the limitations of PHE. We also introduce two novel symmetric PHE schemes that allow arithmetic operations over encrypted data. Being symmetric, our schemes are more efficient than the state-of-the-art asymmetric PHE schemes without compromising the level of security or the range of homomorphic operations they support. We apply the aforementioned techniques in the context of batch data analytics and demonstrate the improvements over previous systems. Finally, we present techniques designed to enable the use of PHE and PPE in resource-constrained Internet of Things (IoT) devices and demonstrate the practicality of stream processing over encrypted data.</p></div></div></div><div><div><div> </div> </div> </div>

Page generated in 0.0306 seconds