Essays about: "secure audio"

Showing result 1 - 5 of 7 essays containing the words secure audio.

  1. 1. Homomorphic Encryption for Audio Conferencing

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Herman Nordin; Ebba Lindström; [2022]
    Keywords : Homomorphic encryption; VoIP; security; audio conferencing; cryptography;

    Abstract : Homomorphic encryption (HE) enables computations on encrypted data making it possible to perform calculations on a server without sharing the secret key for decryption. HE is relatively new and has seen significant improvements in recent years in terms of speed of encryption, decryption, operations, and the number of operations possible to perform in a row without damaging the ciphertext. READ MORE

  2. 2. Can a robot’s confidentiality be trusted?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jesper Öberg; [2021]
    Keywords : ;

    Abstract : Today’s society is becoming more and more connected, all in order to make the availability as user-friendly as possible. But what problems they can lead to if it is not done in a safe way is something that this thesis will test. In this thesis, a cyber security analysis of a connected product is performed. READ MORE

  3. 3. Territorial Copyright Licenses for Audio-visual Content:Steps Towards Overruling the Principle of Copyright Territoriality?

    University essay from Uppsala universitet/Juridiska institutionen

    Author : Barbora Havlíková; [2020]
    Keywords : principle of copyright territoriality; audio-visual; probability regulation; geo-blocking regulation; territorial licensing practices;

    Abstract : The thesis evaluates the  competition law and new legislation adopted under the Digital Single Market Strategy framework and itf effect on the principle of copyright territoriality and current territorial licensing practices. The interest of consumers to access cultural content, the interest of right holders to exploit their work in exchange for renumeration and interest of distributors to secure a broader audience and high income are interests which are taken into account. READ MORE

  4. 4. Out-of-band transfer with Android to configure pre-shared secrets into sensor nodes

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Johannes Nilsson; Jameel Habbosh; [2018]
    Keywords : performance-constrained sensor nodes; out-of-band communications; pre key-exchange problem; smartphone-based transmitter; Technology and Engineering;

    Abstract : Applications based on Wireless Sensor Networks are making their way into all kinds of industries. Today, they can do anything from off-loading hospitals by monitoring patients in their homes to regulating production lines in factories. More often than not, they perform some kind of surveillance and tracking. READ MORE

  5. 5. Audio quality perception of SCIP encrypted voice transmission over low quality radio links

    University essay from Uppsala universitet/Signaler och System

    Author : Anton Sundin; [2016]
    Keywords : SCIP; audio quality perception; packet loss; PESQ;

    Abstract : Tactical radio communications used in military applications hasstrict requirements regarding security and has to be operable inrough environments in which there may be disturbances and disruptionson a radio link. The performance of the Secure CommunicationInteroperability Protocol (SCIP) operating in an asynchronouscommunication network with various levels of packet loss isinvestigated and found inadequate mainly due to problems withcryptographic synchronization between the transmitting and receivingunits. READ MORE