Advanced search

Showing result 1 - 5 of 47 essays matching the above criteria.

  1. 1. Analysis of the security of a VXLAN network

    University essay from KTH/Hälsoinformatik och logistik

    Author : Markus Rehnberg; Erik Ekblad; [2023]
    Keywords : VXLAN; VLAN; security; networking; cloud-computing; VXLAN; VLAN; säkerhet; nätverk; molntjänster;

    Abstract : Traditionally, VLANs have been the most suitable solution for connecting computers. This, in line with the increased use of cloud services in recent years, has given rise to problems with scalability and security within VLAN networks, which need to be investigated. READ MORE

  2. 2. Evaluation of Ferroelectric Tunnel Junction memristor for in-memory computation in real world use cases

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Alec Guerin; Christos Papadopoulos; [2023]
    Keywords : FTJ; Ferroelectric Tunneling Junction; Analog in-memory computing; AIMC; Memristor; A.I.; AIHWKIT; Semantic segmentation; Natural Language Processing; NLP; Neuromorphic Computing; Matrix Vector Multiplication; Technology and Engineering;

    Abstract : Machine learning algorithms are experiencing unprecedented attention, but their inherent computational complexity leads to high energy consumption. However, a paradigm shift in computing methods has the potential to address the issue. READ MORE

  3. 3. Keeping an Indefinitely Growing Audit Log

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Måns Andersson; [2022]
    Keywords : Cryptography; Audit Log; Tamper-evident; Merkle tree; Kryptografi; Granskningslogg; Manipuleringsupptäckbarhet; Merkle träd;

    Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE

  4. 4. Cloud native design of IoT baseband functions : Introduction to cloud native principles

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lalith Kumar Bakthavathsalu; [2020]
    Keywords : Cloud-native; Gateway; GNU Radio; IoT; LoRa; LPWAN; Software-Defined Radio; Cloud-native; Gateway; GNU Radio; IoT; LoRa; LPWAN; Software-Defined Radio;

    Abstract : The exponential growth of research and deployment of 5G networks has led to an increased interest in massive Machine Type Communications (mMTC), as we are on the quest to connect all devices. This can be attributed to the constant development of long-distance and low-powered Internet-of- Things (IoT) technologies, or, Low Power Wide Area Network (LPWAN) technologies such as Long-Range (LoRa) and Narrow Band- IoT (NB-IoT). READ MORE

  5. 5. Evaluation of Cryptographic CRC in 65nm CMOS

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Yang Yu; [2017]
    Keywords : MAC; KMAC; cryptographic CRC; Simulation; Verilog HDL; MATLAB;

    Abstract : With the rapid growth of Internet-of-Things (IoT), billions of devices are expected to be interconnected to provide various services appealing to users. Many devices will get an access to valuable information which is likely to increase the number of malicious attacks on these devices in the future. READ MORE