Essays about: "operativsystem"
Showing result 1 - 5 of 70 essays containing the word operativsystem.
-
1. FFS: A cryptographic cloud-based deniable filesystem through exploitation of online web services : Store your sensitive data in plain sight
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Many Online Web Services (OWSs) today, such as Flickr and Twitter, provide users with the possibility to post images that are stored on the platform for free. This thesis explores creating a cryptographically secure filesystem that stores its data on an online web service by encoding the encrypted data as images. READ MORE
-
2. Phone Free Study : Encouraging students to put away their phones
University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälleAbstract : Many of us have grown up or have been acquainted with individuals who have grown up with smartphones in educational settings. We are well aware of how disruptive they can be, and I myself am not an exception. READ MORE
-
3. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE
-
4. Forensic Analysis of Footstep Data
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Digital forensics is a niche field of study that encompasses such things as extraction, analysis and presentation of digital information, that could be used to produce forensic evidence. There are several companies whose sole specialization is providing technical software solutions to detectives to help them quickly analyze retrieved devices that might contain evidence, instead of having to send the devices to forensic labs. READ MORE
-
5. Smart Attack Detection for IoT Networks
University essay from KTH/Kommunikationssystem, CoSAbstract : The Internet of Things (IoT) is becoming related to more and more people's daily life. It is a network that consists of resource-constrained devices. Nowadays, the application of IoT like smart wearable devices is very common. Due to the wide and important application of IoT, its security also attracts research attention without any doubt. READ MORE