Essays about: "Privacy protocol"

Showing result 11 - 15 of 58 essays containing the words Privacy protocol.

  1. 11. Privacy Enhancing Data Reporting System For Participatory Sensing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tomasz Czajęcki; [2022]
    Keywords : Participatory sensing; data aggregation; MPC; Bluetooth; Participatory sensing; data aggregation; MPC; Bluetooth;

    Abstract : Privacy is a crucial aspect of any system involving user-supplied data. There exist multiple approaches to protecting the identity and secrecy of users in data submission systems. In this thesis, I consider the case of privacy-enhancing of data reporting in Participatory Sensing systems. READ MORE

  2. 12. Which News Articles are You Reading? : Using Fingerprinting to Attack Internal Pages of News Websites

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Martin Lindblom; [2021]
    Keywords : Fingerprint Attack; Privacy; Transport Layer Security; TLS; Real-World Scenario; News Websites; News Articles; Proxy-Less Labelling Heuristic; Transmission Control Protocol; TCP; Internal Pages; Automatic Data Collection;

    Abstract : When performing fingerprinting attacks against websites in a controlled environment astudy may achieve very promising results. However, these can be misleading as the closedworld setting may not accurately represent the real-world. READ MORE

  3. 13. BLOCKCHAIN TECHNOLOGY SECURITY CONCERNS:LITERATURE REVIEW

    University essay from Uppsala universitet/Informationssystem

    Author : Marie Jeanne Tuyisenge; [2021]
    Keywords : Blockchain technology;

    Abstract : Blockchain is a technology that allows the decentralization of data stored in a way that there is no single central actor to control or modify the data. Bitcoin is the first successful blockchain application implemented with the concept known as cryptocurrency that allows a transaction flow without any bank or government to control it. READ MORE

  4. 14. Privacy risks caused by the Swedish Police use of IMSI-catchers in a democratic society

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Karl Martin Stawe; [2021]
    Keywords : ;

    Abstract : For over a decade, the Swedish government has debated the Swedish Police Authority, starting now, the Swedish Police, usage of IMSI-catchers, without finding a solution that provides a formal statute that balances crime-fighting and caring for a natural person's integrity. By IMSI-catchers, the author of this paper refers to the man-in-the-middle attack device that, among other things, can listen to SMS and phone calls in plaintext. READ MORE

  5. 15. Parasitic Tracking Mobile Wireless Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bowen Xu; [2021]
    Keywords : Location privacy attack and evaluation; mobile network simulation; parasitic attacker; Heuristic LSTM;

    Abstract : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. READ MORE