Quantum cryptography

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 6 of 30 - About 297 Essays
  • Improved Essays

    Zigbee Attack Essay

    • 1404 Words
    • 6 Pages

    packets. This will drain the battery of the Zigbee module and can be used to disable the device [9]. The second and most overlooked attack is a physical attack on the actual Zigbee device. Zigbee devices are not very secure. They often store the network key information in plain text without encryption or password protection. Simple AT commands can often be used to retrieve this information if the device is physically accessible. All Zigbee devices in the network have access to the encryption…

    • 1404 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Security and integrity, as well as the privacy of user data, remain an important aspect of any computing-related business. Considering that all businesses have turned to technology in a bid to enhance efficiency, it is common to face security related issues. Cloud robotics which is one of the algorithmic processes is a good example of what can be attained using algorithms. This paper is bent on focusing on practical differences in which algorithms are used in solving problems (phishing) through…

    • 1403 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Android Security Essay

    • 1462 Words
    • 6 Pages

    Analysis of Android Security 2. Application Signing and Distribution • ANDROID- Application signing is done to maintain the identity of the author or the developer of the application. Google ensures that the author or the vendor of the application signs the application with their key as their identity. Developers are required to sign their applications digitally using their private key and through this signature, trust is developed between Google and developers. All applications must be…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    to an extent through the encryption of data and proper access control management. Still even with these security measures in place, dubious attackers can breach the security measures and gain access to the data in the following ways [4]. • Cross-site scripting • Cross-site request forgery • Cookie manipulation • OS and SQL injection • Insecure storage • Hidden field manipulation Due to the vulnerabilities listed above, achieving data security in cloud remains a mammoth task. 1) Network…

    • 1432 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The Quotient Ring Transform is an alternate encoding and decoding process developed by Dr. Anna Johnston [5]. The utility of this error detection and correction process is that it is not dependent on a fixed set of primitive roots. Thus, a standard encryption procedure can be efficiently included in the process. This section lays out Dr. Johnston’s work and provides a simple worked example. 3.1 The Chinese Remainder Theorem Recall the standard statement of the Chinese Remainder Theorem [1]:…

    • 1385 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    The Counterfeit Coins Problem is a well-known complex search problem in mathematics as well as in computer science. It can be related to the data structure (such as binary tree) computer program, algorithm, Graph Theory, Therefore researching this problem is meaningful. The Counterfeit Coins problem can be described as given a set of n look-alike Coins containing One Counterfeit which is a bit heavier or lighter than the genuine Coins. The objective is to find the Counterfeit Coins in minimum…

    • 1802 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Losing Your Keys

    • 878 Words
    • 4 Pages

    Keys are very important to a home owner. You require to have keys so that you can access your house once it is locked. It can be very frustrating to lose your keys. Most individuals have ever lost their keys at one time or another. This might have denied you a chance to do very important activities in your house. This is the reason why you should know some of the ways through which you can lose your keys. Remember that once you lose your keys, you require to replace them as soon as possible. In…

    • 878 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Alan Turing was born June 23rd, 1912. He was the son of Julius Mathison and Ethel Sara Turing. He had an older brother, John Turing. John and Alan did not see their parents much because of their work. Turing was very smart, especially in science. He invented many machines that have helped us get to our point in technology. He saved millions of lives, changing the future forever. Alan Turing has done some major accomplishments in his life. He was not only a mathematician but also a cryptographer…

    • 349 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Technological During World War II: Was the Enigma Machine the Start of the Computer Age? It is true that the loss of life sorely exceeds the individual developments and inventions in technology; but as a whole, technology exceeded most expectations that occurred during the infancy of these advancements. Most of the technology created was meant to hurt one population or another, but it has impacted all of our lives in a positive way since. Possibly the worst time in the history of the world, we…

    • 940 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Johnson Financial (JF) is a mid-sized insurance company located in the northeast United States. The company supports a remote computing environment for users located outside of the corporate offices. The remote users, outside of the corporate network, support various aspects of the business operations. Up to twenty percent of the company users may remote compute at any point in time. The current method of remote computing is based on a company provided laptop and a vpn connection to the…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Page 1 2 3 4 5 6 7 8 9 10 30