Essays about: "Man-In-The-Middle"

Showing result 16 - 20 of 22 essays containing the word Man-In-The-Middle.

  1. 16. Proof-of-Possession Tokens in Microservice Architectures

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Ruaridh Watt; [2018]
    Keywords : ;

    Abstract : The popular OAuth 2.0 Framework specifies the use of Bearer Tokens for the transmission of authorization credentials. A Bearer Token has the property that any party in possession of it can use the it. Requests including Bearer Tokens are therefore performed over a secure channel t oensure that tokens cannot be obtained by eavesdroppers. READ MORE

  2. 17. Security in low power wireless networks : Evaluating and mitigating routing attacks in a reactive, on demand ad-hoc routing protocol

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Tony Fredriksson; Niklas Ljungberg; [2017]
    Keywords : IoT; Security; Ad-hoc Routing; RIME; Sinkhole; Selective Forwarding; Sybil; Intrusion Detection System;

    Abstract : Using low energy devices to communicate over the air presents many challenges to reach security as resources in the world of Internet Of Things (IoT) are limited. Any extra overhead of computing or radio transmissions that extra security might add affects cost of both increased computing time and energy consumption which are all scarce resources in IoT. READ MORE

  3. 18. Formal Verification of Hardware Peripheral with Security Property

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Jonathan Yao Håkansson; Niklas Rosencrantz; [2017]
    Keywords : Formal Verification NuSMV JavaPathFinder Spin Promela CTL LTL DMA UART Model Checking Theorem Proving;

    Abstract : One problem with computers is that the operating system automatically trusts any externallyconnected peripheral. This can result in abuse when a peripheral technically can violate the security model because the peripheral is trusted. Because of that the security is an important issue to look at. READ MORE

  4. 19. A Security and Privacy Audit of KakaoTalk’s End-to-End Encryption

    University essay from KTH/Skolan för elektro- och systemteknik (EES)

    Author : Dawin Schmidt; [2016]
    Keywords : Secure Messaging; End-to-end Encryption; Android Security; Secure Messaging; End-to-end Encryption; Android Security;

    Abstract : End-to-end encryption is becoming a standard feature in popular mobile chat appli-cations (apps) with millions of users. In the two years a number of leading chat apps have added end-end encryption features including LINE, KakaoTalk, Viber, Facebook Messenger, and WhatsApp. READ MORE

  5. 20. Security Evaluation of the Electronic Control Unit Software Update Process

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Liis Jaks; [2014]
    Keywords : ;

    Abstract : A modern vehicle is controlled by a distributed network of embedded devices - Electronic Control Units. The software of these devices is updated over an easily accessible and standardised diagnostic interface. Their hardware capabilities are very low, and thereby the security implementations are fairly minimalistic. READ MORE