To see the other types of publications on this topic, follow the link: Encrypted.

Dissertations / Theses on the topic 'Encrypted'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Encrypted.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Rosén, Oskar. "Encrypted Chat Client : Encrypted communication over XMPP." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177499.

Full text
Abstract:
Every day there are internet users all over the world who sends a total sum of millions of emails and instant messages and a majority of these are sent and transmitted without any form of encryption. When we send an unencrypted message it can be monitored, analyzed and even stored by organiza-tions and individuals. Therefore using encrypted communication is vital for not having our privacy violated. One of the problems that needs to be solved is to allow two persons to communicate in (near) real time through text over internet in a secure and easy way for the user, while at the same time allow
APA, Harvard, Vancouver, ISO, and other styles
2

Brekne, Tønnes. "Encrypted Computation." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2001. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27.

Full text
Abstract:
<p>The ability to construct software, call it a functional ciphertext, which can be remotely executed in encrypted form as an entirely self-contained unit, has the potential for some interesting applications. One such application is the construction of autonomous mobile agents capable of entering into certain types of legally binding contracts on behalf of the sender. At a premium in such circumstances is the ability to protect secret cryptographic keys or other secret information, which typically is necessary for legally binding contracts. Also important is the ability to do powerful computat
APA, Harvard, Vancouver, ISO, and other styles
3

Moataz, Tarik. "Searching over encrypted data." Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0418/document.

Full text
Abstract:
Les services cloud offrent des coûts réduits, une élasticité et un espace de stockage illimité qui attirent de nombreux utilisateurs. Le partage de fichiers, les plates-formes collaboratives, les plateformes de courrier électroniques, les serveurs de sauvegarde et le stockage de fichiers sont parmi les services qui font du cloud un outil essentiel pour une utilisation quotidienne. Actuellement, la plupart des systèmes d'exploitation proposent des applications de stockage externalisées intégrées, par conception, telles que One Drive et iCloud, en tant que substituts naturels succédant au stocka
APA, Harvard, Vancouver, ISO, and other styles
4

Brinkman, Richard. "Searching in encrypted data." Enschede : University of Twente [Host], 2007. http://doc.utwente.nl/57878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reid, Eric. "ENCRYPTED CORRELATING SOURCE SELECTOR." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604265.

Full text
Abstract:
ITC/USA 2006 Conference Proceedings / The Forty-Second Annual International Telemetering Conference and Technical Exhibition / October 23-26, 2006 / Town and Country Resort & Convention Center, San Diego, California<br>Modern telemetry and data streams are often encrypted. The majority of range testing activities require multiple ground stations to collect these streams and send them to a central processing location. Each of these streams currently needs to be individually decrypted before best source selection, processing and analysis. Using innovative techniques, it is possible to time c
APA, Harvard, Vancouver, ISO, and other styles
6

Tran, Augustin. "Encrypted Collaborative Editing Software." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1703311/.

Full text
Abstract:
Cloud-based collaborative editors enable real-time document processing via remote connections. Their common application is to allow Internet users to collaboratively work on their documents stored in the cloud, even if these users are physically a world apart. However, this convenience comes at a cost in terms of user privacy. Hence, the growth of popularity of cloud computing application stipulates the growth in importance of cloud security. A major concern with the cloud is who has access to user data. In order to address this issue, various third-party services offer encryption mechanisms f
APA, Harvard, Vancouver, ISO, and other styles
7

Izadinia, Vafa Dario. "Fingerprinting Encrypted Tunnel Endpoints." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/25351.

Full text
Abstract:
Operating System fingerprinting is a reconnaissance method used by Whitehats and Blackhats alike. Current techniques for fingerprinting do not take into account tunneling protocols, such as IPSec, SSL/TLS, and SSH, which effectively `wrap` network traffic in a ciphertext mantle, thus potentially rendering passive monitoring ineffectual. Whether encryption makes VPN tunnel endpoints immune to fingerprinting, or yields the encrypted contents of the VPN tunnel entirely indistinguishable, is a topic that has received modest coverage in academic literature. This study addresses these question by ta
APA, Harvard, Vancouver, ISO, and other styles
8

Ramkumar, Bhuvaneswari. "Encrypted mal-ware detection." [Ames, Iowa : Iowa State University], 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Guadiana, Juan M., and Fil Macias. "ENCRYPTED BIT ERROR RATE TESTING." International Foundation for Telemetering, 2002. http://hdl.handle.net/10150/607507.

Full text
Abstract:
International Telemetering Conference Proceedings / October 21, 2002 / Town & Country Hotel and Conference Center, San Diego, California<br>End-to-End testing is a tool for verifying that Range Telemetry (TM) System Equipment will deliver satisfactory performance throughout a planned flight test. A thorough test verifies system thresholds while gauging projected mission loading all in the presence of expected interference. At the White Sands Missile Range (WSMR) in New Mexico, system tests are routinely conducted by Range telemetry Engineers and technicians in the interest of ensuring highly r
APA, Harvard, Vancouver, ISO, and other styles
10

Deng, Mo Ph D. Massachusetts Institute of Technology. "On compression of encrypted data." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106100.

Full text
Abstract:
Thesis: S.M. in Electrical Engineering, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 93-96).<br>In this thesis, I took advantage of a model-free compression architecture, where the encoder only makes decision about coding and leaves to the decoder to apply the knowledge of the source for decoding, to attack the problem of compressing encrypted data. Results for compressing different sources encrypted by different class of ciphers are shown and analyz
APA, Harvard, Vancouver, ISO, and other styles
11

Jesu, Alberto. "Reinforcement learning over encrypted data." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23257/.

Full text
Abstract:
Reinforcement learning is a particular paradigm of machine learning that, recently, has proved times and times again to be a very effective and powerful approach. On the other hand, cryptography usually takes the opposite direction. While machine learning aims at analyzing data, cryptography aims at maintaining its privacy by hiding such data. However, the two techniques can be jointly used to create privacy preserving models, able to make inferences on the data without leaking sensitive information. Despite the numerous amount of studies performed on machine learning and cryptography, reinfor
APA, Harvard, Vancouver, ISO, and other styles
12

Xia, Ying Han. "Establishing trust in encrypted programs." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24761.

Full text
Abstract:
Thesis (Ph.D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.<br>Committee Chair: Owen, Henry; Committee Co-Chair: Abler, Randal; Committee Member: Copeland, John; Committee Member: Giffin, Jon; Committee Member: Hamblen, Jim.
APA, Harvard, Vancouver, ISO, and other styles
13

Chung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases." online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Thomas, Nithin. "Transcoding architectures for encrypted digital video." Thesis, University of Bristol, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.504231.

Full text
Abstract:
In order to service heterogenous, variable bandwidth networks, low complexity transcoding architectures have been developed to allow modification of video bitrate. SVC, the scalable extension to H.264, was also developed for this purpose. When encrypted video is transmitted, it cannot be modified prior to decryption. Any decryption carried out at a transcoder would use security weaknesses in the network. In the above context, there is a need to develop transparent encryption techniques that allow bitrate reduction without decryption. For SVC bitstreams, an architecture called SVE is presented
APA, Harvard, Vancouver, ISO, and other styles
15

Guadiana, Juan M. "Best Source Selection on Encrypted Data." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604139.

Full text
Abstract:
ITC/USA 2006 Conference Proceedings / The Forty-Second Annual International Telemetering Conference and Technical Exhibition / October 23-26, 2006 / Town and Country Resort & Convention Center, San Diego, California<br>The size of the range at White Sands means multiple acquisition sites are needed to properly cover a typical vehicle trajectory. As vehicle complexity increase, the need for robust acquisition grows. Multiple acquisition sites are needed to provide as complete coverage as practical. Space Diversity combining would provide a single composite source for all the displays and rec
APA, Harvard, Vancouver, ISO, and other styles
16

Duffy, Harold A. "Merging of Diverse Encrypted PCM Streams." International Foundation for Telemetering, 1996. http://hdl.handle.net/10150/611392.

Full text
Abstract:
International Telemetering Conference Proceedings / October 28-31, 1996 / Town and Country Hotel and Convention Center, San Diego, California<br>The emergence of encrypted PCM as a standard within DOD makes possible the correction of time skews between diverse data sources. Time alignment of data streams can be accomplished before decryption and so is independent of specific format. Data quality assessment in order to do a best-source selection remains problematic, but workable.
APA, Harvard, Vancouver, ISO, and other styles
17

Svensson, Carolin. "Anomaly Detection in Encrypted WLAN Traffic." Thesis, Linköpings universitet, Kommunikationssystem, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-172689.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Dahanayaka, Thilini Nimeshika. "Analytics over Encrypted Traffic and Defenses." Thesis, The University of Sydney, 2023. https://hdl.handle.net/2123/29932.

Full text
Abstract:
Encrypted traffic flows have been known to leak information about their underlying content through statistical properties such as packet lengths and timing. While traffic fingerprinting attacks exploit such information leaks and threaten user privacy by disclosing website visits, videos streamed, and user activity on messaging platforms, they can also be helpful in network management and intelligence services. Most recent and best-performing such attacks are based on deep learning models. In this thesis, we identify multiple limitations in the currently available attacks and defenses against
APA, Harvard, Vancouver, ISO, and other styles
19

Goh, Vik Tor. "Intrusion detection framework for encrypted networks." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41733/1/Vik_Tor_Goh_Thesis.pdf.

Full text
Abstract:
Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial
APA, Harvard, Vancouver, ISO, and other styles
20

Bernagozzi, Stefano. "Range Queries on an encrypted outsourced database." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.

Full text
Abstract:
This project is about retrieving data in range without allowing the server to read it, when the database is stored in the server. Basically, our goal is to build a database that allows the client to maintain the confidentiality of the data stored, despite all the data is stored in a different location from the client's hard disk. This means that all the information written on the hard disk can be easily read by another person who can do anything with it. Given that, we need to encrypt that data from eavesdroppers or other people. This is because they could sell it or log into accounts and
APA, Harvard, Vancouver, ISO, and other styles
21

Lella, Tuneesh Kumar. "Privacy of encrypted Voice Over Internet Protocol." Thesis, Texas A&M University, 2008. http://hdl.handle.net/1969.1/86009.

Full text
Abstract:
In this research, we present a investigative study on how timing-based traffic analysis attacks can be used for recovery of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the generation of traffic whenever the sender detects a voice inactivity period. We use the simple Bayesian classifier and the complex HMM (Hidden Markov Models) classier to evaluate the performance of our attack. Then we describe the usage of acoustic features in our attack to improve the performance. We conclude by presenting a number of problems tha
APA, Harvard, Vancouver, ISO, and other styles
22

Malhotra, Paras. "Detection of encrypted streams for egress monitoring." [Ames, Iowa : Iowa State University], 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Ye, and 张叶. "Query and access control over encrypted databases." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Tahir, Shahzaib. "Privacy preserving search in large encrypted databases." Thesis, City, University of London, 2018. http://openaccess.city.ac.uk/21592/.

Full text
Abstract:
The Cloud is an environment designed for the provision of on-demand resource sharing and data access to remotely located clients and devices. Once data is outsourced to the Cloud, clients tend to lose control of their data thus becoming susceptible to data theft. To mitigate/ reduce the chances of data theft, Cloud service providers employ methods like encrypting data prior to outsourcing it to the Cloud. Although this increases security, it also gives rise to the challenge of searching and sifting through the large amounts of encrypted documents present in the Cloud. This thesis proposes a co
APA, Harvard, Vancouver, ISO, and other styles
25

Grinman, Alex J. "Natural language processing on encrypted patient data." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/113438.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 85-86).<br>While many industries can benefit from machine learning techniques for data analysis, they often do not have the technical expertise nor computational power to do so. Therefore, many organizations would benefit fr
APA, Harvard, Vancouver, ISO, and other styles
26

Wampler, Christopher. "Information leakage in encrypted IP video traffic." Thesis, Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/54287.

Full text
Abstract:
We show that information leakage occurs in video over IP traffic, including for encrypted payloads. It is possible to detect events occurring in the field of view of a camera streaming live video through analysis of network traffic metadata including arrival time between packets, packets sizes, and video stream bandwidth. Event detection through metadata analysis is possible even when common encryption techniques are applied to the video stream such as SSL or AES. We have observed information leakage across multiple codes and cameras. Through timestamps added to the x264 codec, we establish a
APA, Harvard, Vancouver, ISO, and other styles
27

Fernández, Javier, Sabrina Kirrane, Axel Polleres, and Simon Steyskal. "Self-Enforcing Access Control for Encrypted RDF." Springer International Publishing AG, 2017. http://dx.doi.org/10.1007/978-3-319-58068-5_37.

Full text
Abstract:
The amount of raw data exchanged via web protocols is steadily increasing. Although the Linked Data infrastructure could potentially be used to selectively share RDF data with different individuals or organisations, the primary focus remains on the unrestricted sharing of public data. In order to extend the Linked Data paradigm to cater for closed data, there is a need to augment the existing infrastructure with robust security mechanisms. At the most basic level both access control and encryption mechanisms are required. In this paper, we propose a flexible and dynamic mechanism for s
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Bing. "Search over Encrypted Data in Cloud Computing." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/71466.

Full text
Abstract:
Cloud computing which provides computation and storage resources in a pay-per-usage manner has emerged as the most popular computation model nowadays. Under the new paradigm, users are able to request computation resources dynamically in real-time to accommodate their workload requirements. The flexible resource allocation feature endows cloud computing services with the capability to offer affordable and efficient computation services. However, moving data and applications into the cloud exposes a privacy leakage risk of the user data. As the growing awareness of data privacy, more and more u
APA, Harvard, Vancouver, ISO, and other styles
29

White, Matthew L. "Defeating ROP Through Dynamically Encrypted Return Addresses." University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1393237185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Boyang, and Boyang Wang. "Secure Geometric Search on Encrypted Spatial Data." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625567.

Full text
Abstract:
Spatial data (e.g., points) have extensive applications in practice, such as spatial databases, Location-Based Services, spatial computing, social analyses, computational geometry, graph design, medical imaging, etc. Geometric queries, such as geometric range queries (i.e., finding points inside a geometric range) and nearest neighbor queries (i.e., finding the closest point to a given point), are fundamental primitives to analyze and retrieve information over spatial data. For example, a medical researcher can query a spatial dataset to collect information about patients in a certain geometri
APA, Harvard, Vancouver, ISO, and other styles
31

Yi, Shuang. "Reversible data hiding technologies for encrypted images." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3951604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Rantos, Konstantinos. "Key recovery in a business environment." Thesis, Royal Holloway, University of London, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.248051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

James, Jesse Edward. "Intelligent sensing of encrypted packets in wireless networks." Diss., Connect to online resource, 2005. http://wwwlib.umi.com/cr/colorado/fullcit?p1430192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Popa, Raluca Ada. "Building practical systems that compute on encrypted data." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/93830.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 137-152).<br>Theft of confidential data is prevalent. In most applications, confidential data is stored at servers. Thus, existing systems naturally try to prevent adversaries from compromising these servers. However, experience has shown that adversaries still find a way to break in and steal the data. This dissertation shows how to protect data confidentiality even when attackers get acce
APA, Harvard, Vancouver, ISO, and other styles
35

Ng, Wai-Hung. "A Time-Variant Approach for Encrypted Digital Communications." International Foundation for Telemetering, 1989. http://hdl.handle.net/10150/614624.

Full text
Abstract:
International Telemetering Conference Proceedings / October 30-November 02, 1989 / Town & Country Hotel & Convention Center, San Diego, California<br>Two new approaches, a time-variant key and a random transmission rate, are introduced to strengthen the security of encrypted digital communications in which a "black-box" type of crypto-device is employed. These approaches not only further upgrade present crypto-methodology, but may also secure the system against the possibility of the cryptographic key's falling into the hands of an unauthorized listener after initial communication has begun. T
APA, Harvard, Vancouver, ISO, and other styles
36

Stein, David Benjamin. "Efficient homomorphically encrypted privacy-preserving automated biometric classification." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/130608.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, September, 2020<br>Cataloged from the official PDF of thesis.<br>Includes bibliographical references (pages 87-96).<br>This thesis investigates whether biometric recognition can be performed on encrypted data without decrypting the data. Borrowing the concept from machine learning, we develop approaches that cache as much computation as possible to a pre-computation step, allowing for efficient, homomorphically encrypted biometric recognition. We demonstrate two algorithms: an imp
APA, Harvard, Vancouver, ISO, and other styles
37

Lu, Yuanchao. "On Traffic Analysis Attacks To Encrypted VoIP Calls." Cleveland State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=csu1260222271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ricci, Sara. "Outsourcing Computation on Non-Encrypted SensitiveData to Untrusted Clouds." Doctoral thesis, Universitat Rovira i Virgili, 2018. http://hdl.handle.net/10803/586261.

Full text
Abstract:
L’emmagatzematge i el processat de grans dades en entorns locals presenta certs inconvenients, però l’ús del núvol per emmagatzemar i processar les dades pot donar lloc a problemes de privadesa i seguretat. En aquesta tesi tractem la problemàtica associada a l’ús de núvols no confiables. En particular, volem que el núvol pugui fer dos operacions amb dades sensibles no xifrades de manera pràctica i que preservi la privadesa: productes escalars i productes de matrius. Aquestes operacions són útils per fer diferents tipus d’anàlisis de dades com ara el càlcul de correlacions entre atributs i
APA, Harvard, Vancouver, ISO, and other styles
39

Gastaud, Gallagher Nicolas Hugh René. "Multi-Gigahertz Encrypted Communication Using Electro-Optical Chaos Cryptography." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19701.

Full text
Abstract:
Chaotic dynamics are at the center of multiple studies to perfect encrypted communication systems. Indeed, the particular time evolution nature of chaotic signals constitutes the fundamentals of their application to secure telecommunications. The pseudo random signal constitutes the carrier wave for the communication. The information coded on the carrier wave can be extracted with knowledge of the system dynamic evolution law. This evolution law consists of a second-order delay differential equation in which intervene the various parameters of the physical system setup. The set of precise par
APA, Harvard, Vancouver, ISO, and other styles
40

Applin, Joanne Louise. "The encrypted object : the secret world of sixties sculpture." Thesis, University College London (University of London), 2004. http://discovery.ucl.ac.uk/1446476/.

Full text
Abstract:
This thesis examines the work of artists Lucas Samaras, Lee Bontecou and HC Westermann, specifically the way in which they have been excluded from dominant accounts of 1960s sculptural practice. I explore the ways in which a theory of 'secrecy' provides a framework through which to think about each of these artists. Chapter one focuses on Samaras's use of small-scale boxes in relation to his dialogue with the Minimal cubic structure, whilst the second chapter examines the structures of Bontecou in terms of their 'secrecy'. Working from welded steel armatures, Bontecou developed a unique practi
APA, Harvard, Vancouver, ISO, and other styles
41

Lagerhjelm, Linus. "Extracting Information from Encrypted Data using Deep Neural Networks." Thesis, Umeå universitet, Institutionen för tillämpad fysik och elektronik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-155904.

Full text
Abstract:
In this paper we explore various approaches to using deep neural networks to per- form cryptanalysis, with the ultimate goal of having a deep neural network deci- pher encrypted data. We use long short-term memory networks to try to decipher encrypted text and we use a convolutional neural network to perform classification tasks on encrypted MNIST images. We find that although the network is unable to decipher encrypted data, it is able to perform classification on encrypted data. We also find that the networks performance is depending on what key were used to en- crypt the data. These finding
APA, Harvard, Vancouver, ISO, and other styles
42

Joshi, Manasi. "On Reverse Engineering of Encrypted High Level Synthesis Designs." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535466997060049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Kennedy, Sean M. "Encrypted Traffic Analysis on Smart Speakers with Deep Learning." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1562923491454974.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Woodworth, Jason W. "Secure Semantic Search over Encrypted Big Data in the Cloud." Thesis, University of Louisiana at Lafayette, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10286646.

Full text
Abstract:
<p>Cloud storage is a widely used service for both a personal and enterprise demands. However, despite its advantages, many potential users with sensitive data refrain from fully using the service due to valid concerns about data privacy. An established solution to this problem is to perform encryption on the client?s end. This approach, however, restricts data processing capabilities (e.g. searching over the data). In particular, searching semantically with real-time response is of interest to users with big data. To address this, this thesis introduces an architecture for semantically search
APA, Harvard, Vancouver, ISO, and other styles
45

Wiesberg, Angela [Verfasser], and Frederik [Akademischer Betreuer] Armknecht. "Machine learning on encrypted data / Angela Wiesberg ; Betreuer: Frederik Armknecht." Mannheim : Universitätsbibliothek Mannheim, 2018. http://d-nb.info/1169572448/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Fletcher, Christopher W. (Christopher Wardlaw). "Ascend : an architecture for performing secure computation on encrypted data." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/82387.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2013.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 97-101).<br>This thesis considers encrypted computation where the user specifies encrypted inputs to an untrusted batch program controlled by an untrusted server. In batch computation, all data that the program might need is known at program start time. Encrypted computation on untrusted batch programs can be realized through fully homomorphic encryption (FHE) techniques, but FHE's current overheads
APA, Harvard, Vancouver, ISO, and other styles
47

Shah, Meelap (Meelap Vijay). "PARTE : automatic program partitioning for efficient computation over encrypted data." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/79239.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2013.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 45-47).<br>Many modern applications outsource their data storage and computation needs to third parties. Although this lifts many infrastructure burdens from the application developer, he must deal with an increased risk of data leakage (i.e. there are more distributed copies of the data, the third party may be insecure and/or untrustworthy). Oftentimes, the most practical option is to tolerate this
APA, Harvard, Vancouver, ISO, and other styles
48

Areström, Erik. "Flow Classification of Encrypted Traffic Streams using Multi-fractal Features." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148725.

Full text
Abstract:
The increased usage of encrypted application layer traffic is making it harder for traditional traffic categorization methods like deep packet inspection to function. Without ways of categorizing traffic, network service providers have a hard time optimizing traffic flows, resulting in worse quality of experience for the end user. Recent solutions to this problem typically apply some statistical measurements on network flows and use the resulting values as features in a machine learning model. However, by utilizing recent advances in multi-fractal analysis, multi-fractal features can be extrac
APA, Harvard, Vancouver, ISO, and other styles
49

Fischer, Andreas [Verfasser]. "Computing on encrypted data using trusted execution environments / Andreas Fischer." Paderborn : Universitätsbibliothek, 2021. http://d-nb.info/1234058790/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Randall, James P. "Posthumous temporality and encrypted historical time in fiction and life writing." Thesis, Goldsmiths College (University of London), 2018. http://research.gold.ac.uk/23276/.

Full text
Abstract:
This thesis considers ways of reading posthumousness in narrative in various theoretical and literary constellations by focusing on temporality and historical time. Defining posthumousness in terms of a narrative perspective adopted after the death of a character or the narrator, I consider how writers reanimate historical characters, adopt imagined posthumous perspectives and reconstruct historical memory. I combine approaches to temporality by Paul Ricoeur and Mark Currie, incorporating elements of psychoanalytic and poststructuralist theory including Nicolas Abraham and Maria Torok’s writin
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!