Essays about: "decentralized access control"
Showing result 1 - 5 of 7 essays containing the words decentralized access control.
-
1. Decentralized Learning over Wireless Networks with Imperfect and Constrained Communication : To broadcast, or not to broadcast, that is the question!
University essay from Linköpings universitet/KommunikationssystemAbstract : The ever-expanding volume of data generated by network devices such as smartphones, personal computers, and sensors has significantly contributed to the remarkable advancements in artificial intelligence (AI) and machine learning (ML) algorithms. However, effectively processing and learning from this extensive data usually requires substantial computational capabilities centralized in a server. READ MORE
-
2. Energy Efficient Communication Scheduling for IoT-based Waterbirds Monitoring: Decentralized Strategies
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Monitoring waterbirds have several benefits, including analyzing the number of endangered species, giving a reliable indication of public health, etc. Monitoring waterbirds in their habitat is a challenging task since the location is distant, and the collection of monitoring data requires large bandwidth. READ MORE
-
3. Blockchain for Financial Inclusion and Mobile Financial Services : A study in sub-Saharan Africa
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Financial services have historically been offered by central entities which has put financial systems in the control of a number of central parties. Some argue that this centralization has contributed to a more unequal distribution of wealth. READ MORE
-
4. Security of dynamic authorisation for IoT through Blockchain technology
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The use of Internet of Things devices is an integral part of our modern society. Communication with internet of things devices is secured with asymmetric key encryption that is handled by the centralized certificate authority infrastructure. READ MORE
-
5. Designing an Access Control System for Internet of Things
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : For many Internet of Things (IoT) devices security have not been a priority during the development, but what happens if the makers of IoT devices use a secure framework for developing their devices? In this thesis a number of such frameworks have been evaluated for their suitability to build an access control system around. Both Vanadium and Protocol of Things (PoT) were found to be suitable candidates. READ MORE