Essays about: "Privacy protocol"
Showing result 11 - 15 of 58 essays containing the words Privacy protocol.
-
11. Privacy Enhancing Data Reporting System For Participatory Sensing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Privacy is a crucial aspect of any system involving user-supplied data. There exist multiple approaches to protecting the identity and secrecy of users in data submission systems. In this thesis, I consider the case of privacy-enhancing of data reporting in Participatory Sensing systems. READ MORE
-
12. Which News Articles are You Reading? : Using Fingerprinting to Attack Internal Pages of News Websites
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : When performing fingerprinting attacks against websites in a controlled environment astudy may achieve very promising results. However, these can be misleading as the closedworld setting may not accurately represent the real-world. READ MORE
-
13. BLOCKCHAIN TECHNOLOGY SECURITY CONCERNS:LITERATURE REVIEW
University essay from Uppsala universitet/InformationssystemAbstract : Blockchain is a technology that allows the decentralization of data stored in a way that there is no single central actor to control or modify the data. Bitcoin is the first successful blockchain application implemented with the concept known as cryptocurrency that allows a transaction flow without any bank or government to control it. READ MORE
-
14. Privacy risks caused by the Swedish Police use of IMSI-catchers in a democratic society
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : For over a decade, the Swedish government has debated the Swedish Police Authority, starting now, the Swedish Police, usage of IMSI-catchers, without finding a solution that provides a formal statute that balances crime-fighting and caring for a natural person's integrity. By IMSI-catchers, the author of this paper refers to the man-in-the-middle attack device that, among other things, can listen to SMS and phone calls in plaintext. READ MORE
-
15. Parasitic Tracking Mobile Wireless Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. READ MORE