Essays about: "TLS Protocol"

Showing result 1 - 5 of 38 essays containing the words TLS Protocol.

  1. 1. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Krister Georges; Per Jahnstedt; [2023]
    Keywords : NETCONF; MbedTLS; YANG; Embedded; SNMP; XML; HMS; IETF; IIoT; ABCC; Wireshark; TLS; Porting; RTOS; IoT; Interoperability; Networking; Security; Protocols; C C ; Embedded Linux; Configuration Management; Microcontroller; Microprocessor; Scalability; Hardware Interfaces; Hardware; Open source; QA; Data Modeling; System Integration; Automation;

    Abstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE

  2. 2. Securing LwM2M with Mbed TLS in Contiki-NG

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Jayendra Ellamathy; [2023]
    Keywords : ;

    Abstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE

  3. 3. Cloud-based video stabilization processing in real-time

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Brecht Callens; [2022]
    Keywords : ;

    Abstract : On-device real-time video stabilization has become a common feature of modernsmartphones. This processing technique improves quality but is an expensive processthat requires significant resources from the devices themselves. By offloading thisprocess to the cloud, much better hardware could be utilized to perform these tasks. READ MORE

  4. 4. The Everyday Internet, a Minefield in Disguise : Characterization of different types of domains including malicious and popularity

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Linn Petersson; Rebecka Lindkvist; [2022]
    Keywords : characterisation; malicious; domains; vulnerabilities; cipher suites; TLS; protocols; security; certificates;

    Abstract : Today, security has become a growing concern for all internet users, where technology is developing faster than its security is implemented, which leads to insecure domains. In this thesis, we look at the reality of today’s domains and research if some categories of domains are safer than others and the reason behind it. READ MORE

  5. 5. Design and evaluation of an inter-core QUIC connection migration approach for intra-server load balancing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zhe Wang; [2021]
    Keywords : Intra-server load balancing; QUIC protocol; Connection migration; BPF; Connection management; Lastbalansering mellan servern; QUIC protokoll; Anslutningsmigrering; BPF; Anslutningshantering;

    Abstract : With the emergence of novel cloud applications and their critical latency demand [1], Quick UDP Internet Connection (QUIC) [2] was proposed as a new transport protocol that is promising to reduce the connection establishment overhead while providing security properties similar to Transport Layer Security (TLS) [3]. However, without an efficient task scheduling mechanism, the high cost for encryption and decryption in QUIC can easily lead to load imbalance among multiple Central Processing Unit (CPU) cores and thus cause a high tail latency. READ MORE