Essays about: "Privacy protocol"
Showing result 21 - 25 of 58 essays containing the words Privacy protocol.
-
21. Secure and Privacypreserving V2X multicast DNS
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Domain Name System is a hierarchical naming system that provides information of network resources or services given domain names. DNS applications in vehicular networks raise new challenges with regards to security and privacy of vehicles. READ MORE
-
22. Transaction synchronization and privacy aspect in blockchain decentralized applications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The ideas and techniques of cryptography and decentralized storage have seen tremendous growth in many industries, as they have been adopted to improve activities in the organization. That called Blockchain technology, it provides an effective transparency solution. READ MORE
-
23. Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. READ MORE
-
24. Pushing the Limits of Gossip-Based Decentralised Machine Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Recent years have seen a sharp increase in the ubiquity and power of connected devices, such as smartphones, smart appliances and smart sensors. These de- vices produce large amounts of data that can be extremely precious for training larger, more advanced machine learning models. READ MORE
-
25. Self-Organizing High-Assurance Privacy
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : When using a network, devices might have to securely communicate with oneanother. Issues arise when the devices are unaware of others in the network, orwhen the devices have to be manually updated with the information about thedevices they wish to communicate with. This presents an issue with bootstrappingover networks. READ MORE