Advanced search

Found 5 essays matching the above criteria.

  1. 1. Designing Diverse Features to Reduce the Filter Bubble Effect on Social Media

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ramya Kandula; [2023]
    Keywords : Filter bubbles; recommender systems; diversity; social media; filter bubblor; rekommenderande system; mångfald; sociala medier;

    Abstract : The filter bubble effect has been an active area of research that has been explored in various contexts within social media. Research on recommender system designs within filter bubbles has received a lot of attention, mainly due to its impact on the phenomena. READ MORE

  2. 2. Gamification Otherwise : Alternative directions to enhance the sense of friendliness in online communities

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anna Chuprina; [2023]
    Keywords : gamification; sense of community; engagement; social media; gamification; känslan av gemenskap; engagemang; sociala medier;

    Abstract : Gamification is a widely explored topic in various contexts. In particular, gamification is used in the form of likes and reactions on various social media. However, it was identified that this reward system in the form of likes led to addictive behavior. READ MORE

  3. 3. Using Requirement-Driven Symbolic Execution to Test Implementations of the CoAP and EDHOC Network Protocols

    University essay from Uppsala universitet/Datalogi

    Author : Sabor Amini; [2023]
    Keywords : Requirement-driven; Symbolic execution; Network protocols; CoAP; EDHOC; Kravbaserad; Symbolisk Exekvering; Nätverksprotokoll;

    Abstract : As the number of Internet of Things devices is increasing rapidly, it is of utmost significance that the implementations of protocols for constrained devices are bug-free. In general implementations of network protocols are error-prone due to their complex nature and ambiguities in the protocol specification. READ MORE

  4. 4. Evaluation of Certificate Enrollment over Application Layer Security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexandros Krontiris; [2018]
    Keywords : Certificate Enrollment Management; application layer security; Ephemeral Diffie-Hellman Over COSE EDHOC ; key exchange protocol.; Certifikat inskrivning förvaltning; applikationslager säkerhet; Ephemeral Diffie-Hellman Over COSE EDHOC ; nyckelutbytesprotokoll.;

    Abstract : This thesis analyzes Application Layer security protocols for certificate enrollment and management. EDHOC, Ephemeral Diffie-HellmanOver COSE, is a recently developed key exchange protocol whichis designed to provide authentication and key-exchange functionality with compact message sizes and minimum round-trip-time. READ MORE

  5. 5. End-to-end Security Enhancement of an IoT Platform Using Object Security

    University essay from Linköpings universitet/Informationskodning

    Author : Hampus Tjäder; [2017]
    Keywords : Object security; COSE; IoT security; End-to-end security; CoAP; LWM2M; Bluetooth Low Energy; BLE security;

    Abstract : The Internet of Things (IoT) is seen as one of the next Internet revolutions. In a near future the majority of all connected devices to the Internet will be IoT devices. These devices will connect previously offline constrained systems, thus it is essential to ensure end-to-end security for such devices. READ MORE