Národní úložiště šedé literatury Nalezeno 3 záznamů.  Hledání trvalo 0.00 vteřin. 
Collection of Sensor Data into Cloud
Záhorský, Matej ; Musil, Petr (oponent) ; Nosko, Svetozár (vedoucí práce)
The primary objective of this thesis is data collection from selected sensors to a remote Cloud with the use of STM32MP1. The first part of this thesis includes theory about data collection options, their cryptographic security and functions of the given microcontroller. The second part is about design and implementation of proper software solution for effective and secure data collection from specific sensors. A thorough assessment of this particular solution is described in the last part, which includes cryptographic signing performance in a real world application.
Asymmetric-Key Cryptography in Embedded Systems
Záhorský, Matej ; Kula, Michal (oponent) ; Nosko, Svetozár (vedoucí práce)
The primary goal of this thesis is to find and implement an existing asymmetric cryptographic algorithm in a FPGA and evaluate its performance. The first chapter of this thesis focuses on embedded systems and FPGAs, while describing their structure and purpose. The second chapter compares different cryptographic algorithms and their properties, which would make them usable in embedded systems. The design and implementation phases of this project describe and implement a solution, which includes the selection and integration of a signature algorithm in a FPGA. Additionally, further optimizations to increase the computing performance are also implemented in a form of hardware acceleration, which are then compared to the original algorithm in the evaluation chapter.
Collection of Sensor Data into Cloud
Záhorský, Matej ; Musil, Petr (oponent) ; Nosko, Svetozár (vedoucí práce)
The primary objective of this thesis is data collection from selected sensors to a remote Cloud with the use of STM32MP1. The first part of this thesis includes theory about data collection options, their cryptographic security and functions of the given microcontroller. The second part is about design and implementation of proper software solution for effective and secure data collection from specific sensors. A thorough assessment of this particular solution is described in the last part, which includes cryptographic signing performance in a real world application.

Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.