Essays about: "Privacy protocol"

Showing result 21 - 25 of 58 essays containing the words Privacy protocol.

  1. 21. Secure and Privacypreserving V2X multicast DNS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ayub Atif; Justin Arieltan; [2020]
    Keywords : Vehicular Communications; DNS; Security and Privacy; PKI; Pseudonym; Bloom Filter; Vehicle Multi-hop Protocol; Fordonskommunikation; DNS; Säkerhet och integritet; PKI; Pseudonym; Bloom filter; Fordons multihopp-protokoll;

    Abstract : The Domain Name System is a hierarchical naming system that provides information of network resources or services given domain names. DNS applications in vehicular networks raise new challenges with regards to security and privacy of vehicles. READ MORE

  2. 22. Transaction synchronization and privacy aspect in blockchain decentralized applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Patarawan Ongkasuwan; [2020]
    Keywords : Blockchain; distributed database; distributed ledger; digital ledgers; centralized database; decentralized database; Ethereum; Blockchain synchronization; security-related; cryptocurrency; digital currency; transaction; user experience; privacy strategy; smart contract; risk; Blockchain; distribuerad storbok; digital ledbok; centraliserad databas; decentraliserad databas; Ethereum; Blockchain-synkronisering; säkerhetsrelaterad; cryptocurrency; digital valuta; transaktion; användarupplevelse; sekretessstrategi; smart kontrakt; risk;

    Abstract : The ideas and techniques of cryptography and decentralized storage have seen tremendous growth in many industries, as they have been adopted to improve activities in the organization. That called Blockchain technology, it provides an effective transparency solution. READ MORE

  3. 23. Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Nico Ferrari; [2019]
    Keywords : Internet of Things; Context-based authentication; Fuzzy commitment scheme; Cryptographic key establishment; Lightweight cryptography; Contiki; One-way accumulators;

    Abstract : The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. READ MORE

  4. 24. Pushing the Limits of Gossip-Based Decentralised Machine Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lodovico Giaretta; [2019]
    Keywords : machine learning; distributed systems; decentralised algorithms; gossip algorithms;

    Abstract : Recent years have seen a sharp increase in the ubiquity and power of connected devices, such as smartphones, smart appliances and smart sensors. These de- vices produce large amounts of data that can be extremely precious for training larger, more advanced machine learning models. READ MORE

  5. 25. Self-Organizing High-Assurance Privacy

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Joakim Ingnäs; Nicole Tutsch; [2019]
    Keywords : ;

    Abstract : When using a network, devices might have to securely communicate with oneanother. Issues arise when the devices are unaware of others in the network, orwhen the devices have to be manually updated with the information about thedevices they wish to communicate with. This presents an issue with bootstrappingover networks. READ MORE