Essays about: "Client security"

Showing result 1 - 5 of 124 essays containing the words Client security.

  1. 1. Evaluating Connectivity for RabbitMQ stream clients in front of Load Balancers

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Hanna Littorin; [2024]
    Keywords : ;

    Abstract : Message brokers play a crucial role in decoupling senders and receivers within distributed systems. In some scenarios, it is necessary to distribute a message broker across multiple nodes to form a cluster. To ensure even and fair distribution of client requests across nodes, load balancers are commonly employed in front of the cluster. READ MORE

  2. 2. Impact of fixed-rate fingerprinting defense on cloud gaming experience

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Kent Thang; Adam Nyberg; [2023]
    Keywords : cloud gaming; QoE; QoS; proxy; fingerprinting defense; website fingerprinting attack;

    Abstract : Cloud gaming has emerged as a popular solution to meet the increasing hardware de-mands of modern video games, allowing players with dated or non-sufficient hardwareto access high-quality gaming experiences. However, the growing reliance on cloud ser-vices has led to heightened concerns regarding user privacy and the risk of fingerprintingattacks. READ MORE

  3. 3. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Krister Georges; Per Jahnstedt; [2023]
    Keywords : NETCONF; MbedTLS; YANG; Embedded; SNMP; XML; HMS; IETF; IIoT; ABCC; Wireshark; TLS; Porting; RTOS; IoT; Interoperability; Networking; Security; Protocols; C C ; Embedded Linux; Configuration Management; Microcontroller; Microprocessor; Scalability; Hardware Interfaces; Hardware; Open source; QA; Data Modeling; System Integration; Automation;

    Abstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE

  4. 4. Evaluation of Using the WebRTC Protocol as a Fully Distributed System : Measure, benchmark, and evaluate the performance of the WebRTC protocol

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Mryam Teklya Suyum; [2023]
    Keywords : Distributed Systems; WebRTC; WebSocket; HTTPS; Signaling Server; Peer-to-Peer Communication; RTP; RTCPeerConnection API; Performance Analysis; Latency RTT; Jitter; Packet Loss; Distribuerade system; WebRTC; WebSocket; HTTPS; signalserver; peer-to-peer-kommunikation; RTP; RTCPeerConnection API; prestandaanalys; latens RTT; jitter; paketförlust;

    Abstract : Syftet med detta examensarbete är att och utvärdera undersöka analysera och utvärdera prestandan hos WebRTC-protokollet, samt att utveckla en webbaserad klient med hjälp av JavaScript för distribuerade system och demonstrera protokollets användbarhet i ett verkligt scenario. Studien inkluderade användning av olika verktyg och bibliotek, såsom Socket. READ MORE

  5. 5. Cryptography Executed in Web Browsers – Achieving Convenient End-to-End Security for Lock Access Control

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Chanvuth Chea; [2023]
    Keywords : ;

    Abstract : Many client-server applications are not protected with end-to-end security, allowing the web server to control all data. In this thesis, the feasibility of executing modern cryptography on the web browser has been evaluated and proposed an end-to-end security design for cloud-based lock access control. READ MORE