Searched for: subject%3A%22Cryptography%22
(1 - 4 of 4)
document
Granneman, Erik (author)
The increasing advancements in quantum computing have led to an increasing danger for the cyberspace. The current cryptographic algorithms that are used to enable secure communication across insecure channels have the potential to be brute-forced by sufficiently powerful quantum computers, endangering the security of many electronic devices and...
master thesis 2022
document
Hoogland, Mathijs (author)
The role of Internet of Things (IoT) devices is becoming larger in our day-to-day life. More and more, devices are used to help with simple tasks in our lives. Little computers are installed in a large variety of consumer products and are often connected to the internet. The large increase of these “resource-constrained” devices that are...
master thesis 2018
document
Barrero, D.F. (author), Hernandez-Castro, J.C. (author), Peris-Lopez, P. (author), Camacho, D. (author), Moreno, M.D.R. (author)
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational...
journal article 2012
document
Cartrysse, K. (author)
This thesis' objective is to provide privacy to mobile code. A practical example of mobile code is a mobile software agent that performs a task on behalf of its user. The agent travels over the network and is executed at different locations of which beforehand it is not known whether or not these can be trusted. Because a mobile software agent...
doctoral thesis 2005
Searched for: subject%3A%22Cryptography%22
(1 - 4 of 4)