Essays about: "protection layer"

Showing result 6 - 10 of 72 essays containing the words protection layer.

  1. 6. Rethinking Execution Layer Front-Running Protection with Threshold Encryption : F3B: A Per-Transaction Front-Running Protection Architecture with Low-Latency Overhead

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyan Qu; [2023]
    Keywords : Blockchain; Front Running; Threshold Encryption; Blockchain; Front Running; Tröskelkryptering;

    Abstract : Blockchain is a decentralized and immutable append-only ledger. Smart contracts, the self-executing programs on blockchain, help build the Decentralized Finance (DeFi) markets. Front-running is the practice of benefiting from advanced knowledge of pending transactions. READ MORE

  2. 7. Radiation Shielding Simulations for Small Satellites on Geostationary Transfer Orbit

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Anton Fetzer; [2022]
    Keywords : GTO; Foresail-2; CubeSat; Radiation Shielding; Geant4; Radiation Belts; GTO; Foresail-2; CubeSat; säteilysuojaus; Geant4; säteilyvyöhyke;

    Abstract : The emergence of small and affordable satellites has led to rapid growth in the number of launched satellites over the past two decades. To save costs, small satellites often use mass-produced electronic components not explicitly designed for the radiation environment of space, which reduces reliability and makes them unsuitable for higher orbits. READ MORE

  3. 8. MACsec in Classic AUTOSAR : MACsec Implementation PoC on Classic AUTOSAR ECUs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamna Zahid; [2022]
    Keywords : Automotive Ethernet; MKA; MACsec; Network security; Classic AUTOSAR; Automotive Ethernet; MKA; MACsec; Nätverkssäkerhet; Classic AUTOSAR;

    Abstract : Classic AUTOSAR provides a standardized architecture and guidelines for automotive development. However, it does not include specifications for securing Ethernet communication. The IEEE 802.1AE standard specifies a security standard called Media Access Control Security (MACsec) to protect Ethernet communication. READ MORE

  4. 9. A False Sense of Security? - A Critical Analysis of the Civilian Protection Against Attacks on Nuclear Power Plants in International Armed Conflicts

    University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Author : Sam Boekelman; [2022]
    Keywords : Folkrätt; Public international law; International humanitarian law; International armed conflicts; Nuclear power plants; Law and Political Science;

    Abstract : Mot bakgrund av kriget mellan Ryssland och Ukraina i närheten av kärnkraft-verket i Zaporizjzja frågar sig många hur civilbefolkningar i dag är skyddade mot en potentiell kärnkraftskatastrof orsakad av krig. Syftet med denna upp-sats är således att undersöka vilka bestämmelser som finns för att skydda ci-vila mot militära attacker på kärnkraftverk i internationella väpnade konflikter, samt att undersöka hur effektivt de nämnda bestämmelserna skyddar civila. READ MORE

  5. 10. Password protection by analyzed keystrokes : Using Artificial Intelligence to find the impostor

    University essay from

    Author : Robert Danilovic; Måns Svensson; [2021]
    Keywords : Keystroke dynamics; Password security; Artificial Intelligence; Mobile application; Neural network; SVM; Gyroscope; Typing Characteristics;

    Abstract : A literature review was done to find that there are still issues with writing passwords. From the information gathered, it is stated that using keystroke characteristics could have the potential to add another layer of security to compromised user accounts. READ MORE