Essays about: "Anonymitet"
Showing result 11 - 15 of 28 essays containing the word Anonymitet.
-
11. Measuring latency for live video calls routed via vanilla and modified Tor
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Tor is an anonymity network which consists of relays (or nodes) dispersed over the world. By interlaying a connection with the relays it becomes more difficult to conclude who the sender and receiver of the connection is, however the latency is also increased. READ MORE
-
12. A comparative study on Tor’s client compromise rates when changing the number of guard nodes and their rotation time
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Tor Project is a non-profit organization with the belief that Internet users should have private access to an uncensored Web. Tor accomplishes this through onion routing, which uses multi-layered encryption. Tor’s design is not flawless and different attacks are being performed to deanonymize users. READ MORE
-
13. Promoting conceptual understanding in high-school physics : Exploring the effects of using an audience response system
University essay from KTH/LärandeAbstract : Research shows that students may be proficient in solving physics problem mathematically but still lack a fundamental understanding of the phenomena in question. One reason may be that a traditional approach to physics instruction emphasises instructors transfer of material to the students and problem-solving, sometimes at the expense of conceptional understanding. READ MORE
-
14. A Cloud-native Vehicular Public Key Infrastructure : Towards a Highly-available and Dynamically- scalable VPKIaaS
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Efforts towards standardization of Vehicular Communication Systems (VCSs) have been conclusive on the use of Vehicular Public-Key Infrastructure (VPKI) for the establishment of trust among network participants. Employing VPKI in Vehicular Communication (VC) guarantees the integrity and authenticity of Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs). READ MORE
-
15. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE