Essays about: "Anonymitet"

Showing result 11 - 15 of 28 essays containing the word Anonymitet.

  1. 11. Measuring latency for live video calls routed via vanilla and modified Tor

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Magnus Åkerfeldt; Carl Engelhardt; [2021]
    Keywords : ;

    Abstract : Tor is an anonymity network which consists of relays (or nodes) dispersed over the world. By interlaying a connection with the relays it becomes more difficult to conclude who the sender and receiver of the connection is, however the latency is also increased. READ MORE

  2. 12. A comparative study on Tor’s client compromise rates when changing the number of guard nodes and their rotation time

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Rami Marrikie; Waled Rached; [2021]
    Keywords : ;

    Abstract : The Tor Project is a non-profit organization with the belief that Internet users should have private access to an uncensored Web. Tor accomplishes this through onion routing, which uses multi-layered encryption. Tor’s design is not flawless and different attacks are being performed to deanonymize users. READ MORE

  3. 13. Promoting conceptual understanding in high-school physics : Exploring the effects of using an audience response system

    University essay from KTH/Lärande

    Author : Diana Diez; [2021]
    Keywords : Audience response system; Mentimeter; formative assessment; peer instruction; physics; Publiksvarssystem; Mentimeter; formativ bedömning; kamratlärande; gymnasiefysik;

    Abstract : Research shows that students may be proficient in solving physics problem mathematically but still lack a fundamental understanding of the phenomena in question. One reason may be that a traditional approach to physics instruction emphasises instructors transfer of material to the students and problem-solving, sometimes at the expense of conceptional understanding. READ MORE

  4. 14. A Cloud-native Vehicular Public Key Infrastructure : Towards a Highly-available and Dynamically- scalable VPKIaaS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamid Noroozi; [2021]
    Keywords : Security; Privacy; Vehicular PKI; VPKI; Identity and Credential Management; Vehicular Communications; VANETs; Availability; Scalability; Resilient; Efficiency; Microservice; Container Orchestration; Cloud; Pseudonym Transition; Pseudonym Unlinkability.; Säkerhet; personlig integritet; identitet- och behörighetsuppgifter; tillgänglighet; skalbarhet; motståndskraftig; effektivitet; moln; pseudonymitet; anonymitet; ospårbarhet.;

    Abstract : Efforts towards standardization of Vehicular Communication Systems (VCSs) have been conclusive on the use of Vehicular Public-Key Infrastructure (VPKI) for the establishment of trust among network participants. Employing VPKI in Vehicular Communication (VC) guarantees the integrity and authenticity of Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs). READ MORE

  5. 15. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexandra Kolonia; Rebecka Forsberg; [2020]
    Keywords : Network security; Privacy; Anonymity; Onion routing; Tor Organization; Wi-Fi data collection; Nätverkssäkerhet; Sekretess; Anonymitet; Lök-routing; Tor Organisation; Wifidatainsamling;

    Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE