Essays about: "mobile ip commUNICATION"
Showing result 1 - 5 of 49 essays containing the words mobile ip commUNICATION.
-
1. Software development of visualizationsystem
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Today wireless technologies are increasing in the automation systems used in homes and buildings. More electrical devices are used in a house to save time, money, and energy because they are relatively inexpensive and easy to install; these devices even allow smart components such as mobile tablets and computer connectivity. READ MORE
-
2. Polyphase Symbol Timing Synchronization on a Software-Defined Radio
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Software-defined radio is a continuously developing technology applied in fields of mobile communications and among others. It is a radio communication system where software is used to implement parts of its functionality in an embedded system or computer. READ MORE
-
3. Parasitic Tracking Mobile Wireless Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. READ MORE
-
4. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE
-
5. Security Auditing and Testing of two Android Client-Server Applications
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : How secure is your application? How can you evaluate if it is secure? The threats are many and may be hard to find. In a world where things are more and more automated; how does manual labour contribute to security auditing applications? This study aims to assess two proof of concept Android client-server applications, developed by students to suit the needs of a fictitious Police Department and Fire Department, respectively. READ MORE