| | SLO | ENG | Piškotki in zasebnost

Večja pisava | Manjša pisava

Iskanje po katalogu digitalne knjižnice Pomoč

Iskalni niz: išči po
išči po
išči po
išči po
* po starem in bolonjskem študiju


1 - 2 / 2
Na začetekNa prejšnjo stran1Na naslednjo stranNa konec
Signing blockchain transactions using qualified certificates
Muhamed Turkanović, Blaž Podgorelec, izvirni znanstveni članek

Opis: Blockchain technology is increasingly being considered among both private enterprises and public services. However, it poses a challenge with regard to aligning its identity management scheme with the Public Key Infrastructure and the Qualified Digital Certificates issued by Qualified Trust Service Providers. To solve this challenge, we will present a solution in the form of an architecture reference model, which enables enterprises and public services to leverage blockchain technology by integrating Qualified Electronic Signatures with blockchain transactions. The evaluation of the architecture reference model is provided through the design of a Blockchain-based Trusted Public Service and a use-case scenario example. The proposed architecture reference model is based on the CEF building blocks EBSI, eSignature, and eID compliant with eIDAS
Ključne besede: blockchain, computer architecture, distributed ladger, fabrics, elliptic curve cryptography, internet, law
Objavljeno v DKUM: 08.12.2022; Ogledov: 570; Prenosov: 131
.pdf Celotno besedilo (215,95 KB)
Gradivo ima več datotek! Več...

The Complexity of Cryptography in Literature
Sonja Sedej, 2016, magistrsko delo

Opis: Cryptography first appeared approximately four thousand years ago; it has developed and improved throughout history. Cryptography has an important role in the modern world. Cryptography has been a part of our lives for nearly four thousand years; nevertheless, the first book on cryptography did not appear until 1499, when John Tritheim published a collection of codes used in some European courts. Today, cryptography affects us in many seen and unseen forms and shapes. Therefore, I am not surprised to see that it is commonplace in fiction. The purpose of this thesis is not to study the light summer reading that has lately filled the bookshelves, but to systematically research the complexity of cryptography in different literary genres. In The Complexity of Cryptography in Literature, I analyze cryptography in English literature throughout the past two centuries. My thesis is, for many reasons, written in English; the study of English and American Literature, an English speaking mentor and researching literature written in English. Using analysis and synthesis I study two secondary theoretical sources, Codes and Ciphers – A History of Cryptography written by Alexander D'Agapeyeff and Codes, Ciphers and Secret Writing written by Martin Gardner. At the same time I introduce the appropriate terminology which is necessary for further understanding. The thesis summarizes and presents the history of cryptography. The latter is researched using the method of analysis and synthesis in The Code Book by Simon Sing and The Code-Breakers by David Kahn. Using the basic methods and history of cryptography, I will show that many methods of cryptography are described in literature; these are closely related to cryptography’s historical development. Furthermore, I propose that these methods are used in a wide spectra of literary genres; at the same time I will show that mostly simple or simplified methods of cryptography are used in literature; otherwise, they would not be accessible to the average reader. The thesis analyzes the complexity of cryptography in six different works of literature with reference to standard mathematical models of cryptography. I analyze the above mentioned works of literature, and using classification and mathematical methods, I process and present the appearance of cryptography in individual works (the methods and their correctness); then, using historical and comparative methods, I research the relationship between cryptographic methods used in literature and actual historical use of cryptography. Further on, I use various methods (the mathematical method, the method of analysis and synthesis, the method of interpretation, and the descriptive method) to present the complexity of cryptographic methods in literature.
Ključne besede: cryptography, code, cipher, complexity, fiction
Objavljeno v DKUM: 26.08.2016; Ogledov: 2175; Prenosov: 156
.pdf Celotno besedilo (2,49 MB)

Iskanje izvedeno v 9.11 sek.
Na vrh
Logotipi partnerjev Univerza v Mariboru Univerza v Ljubljani Univerza na Primorskem Univerza v Novi Gorici