Essays about: "secure embedded system"
Showing result 1 - 5 of 35 essays containing the words secure embedded system.
-
1. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE
-
2. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE
-
3. Ecosystems Services in swidden agriculture in the Peruvian tropical Andes : the Kechwa-Lamas farm-forestry system
University essay from SLU/Dept. of Urban and Rural DevelopmentAbstract : In the Amazon, life supporting services are importantly associated to forest areas. Nevertheless, the connection of ecosystem services to agricultural systems it is also of great importance, because agriculture is one of the most important causes of degradation and loss of these areas. READ MORE
-
4. Secure log-management for an Apache Kafka-based data-streaming service
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : This thesis aims to investigate the prospect of using Apache Kafka to manage data streams based on secrecy/classification level and separate these data streams in order to meet the requirement set by the secrecy/classification levels. Basalt AB has the responsibility of managing classified data for private and state actors, including the Swedish Armed Forces and other organizations. READ MORE
-
5. Securing LwM2M with Mbed TLS in Contiki-NG
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE