Essays about: "Smartphone Security"

Showing result 1 - 5 of 52 essays containing the words Smartphone Security.

  1. 1. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ossian Dillner; [2023]
    Keywords : Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE

  2. 2. Cryptography Executed in Web Browsers – Achieving Convenient End-to-End Security for Lock Access Control

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Chanvuth Chea; [2023]
    Keywords : ;

    Abstract : Many client-server applications are not protected with end-to-end security, allowing the web server to control all data. In this thesis, the feasibility of executing modern cryptography on the web browser has been evaluated and proposed an end-to-end security design for cloud-based lock access control. READ MORE

  3. 3. Implementing and Investigating Partial Consent for Privacy Management of Android

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Mohan Krishna Reddy Nallamilli; Satya Venkat Naidu Jagatha; [2022]
    Keywords : Partial consent; Access control; Data Privacy; Data Security; Usability Aspect;

    Abstract : Background: Data privacy and security has been a big concern in recent years. Data privacy is a concern for everybody who owns a smartphone or accesses a website. This is due to the applications that have been installed on the device or the cookies that have been acquired via websites in the form of advertising cookies. READ MORE

  4. 4. Determining whether the Hövding bicycle airbag is secure against cyber attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Henrik Mellin; [2022]
    Keywords : Penetrationtesting; Internet of Things; Threatmodeling; BluetoothLowEnergy; Firmware analysis; Reverse engineering; Penetrationstestning; Sakernasinternet; Hotmodellering; BluetoothLowEnergy; Analys of fast programvara; Baklängeskonstruktion;

    Abstract : This thesis is about cyber-security and penetration testing. More specifically it concerns penetration testing of a Hövding bicycle airbag which is a smart alternative to a traditional bicycle helmet. The thesis focuses on exploiting Bluetooth Low Energy, firmware analysis and reverse engineering. READ MORE

  5. 5. “WHEN YOU THINK ABOUT IT, IT’S NOT TOTALLY CLEAR WHAT’S OKAY AND WHAT’S NOT”: An interview study of how young people reason about smartphone surveillance in romantic relationships

    University essay from Göteborgs universitet/Statsvetenskapliga institutionen

    Author : Ellinor Snickars; [2021-07-20]
    Keywords : ;

    Abstract : Snooping attacks, unauthorized access, and GPS-tracking: In the past years, a new kind of interpersonal surveillance has earned attention within the field of men’s violence against women and cyberspace security - Smartphone surveillance. Investigating the digital dimension of intimate partner violence, Dragiewicz et al. READ MORE