Essays about: "Network Access Protection"

Showing result 11 - 15 of 39 essays containing the words Network Access Protection.

  1. 11. Authentication and Identification of Sensor Nodes to Avoid Unauthorized Access in Sensor Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Michael Henriksson; [2020]
    Keywords : Sensor network; Key distribution center; Zigbee; CHAP; Device authentication; Sensornätverk; Key distribution center; Zigbee; CHAP; Autentisering;

    Abstract : With the increasing popularity of Internet of Things (IoT), network connected devices and sensors, to easier collect data is security an aspect that must not be forgotten. When sensitive data, such as personal or private data, is sent over the network without protection can it easier be obtained by anyone who want to get their hands on it. READ MORE

  2. 12. Can Access to Fast Internet in Africa Promote HIV Awareness and Prevention? - Evidence from Nigeria

    University essay from Handelshögskolan i Stockholm/Institutionen för nationalekonomi

    Author : Marie Helen Günther; [2020]
    Keywords : HIV Awareness; HIV Prevention; Internet; Submarine Cables; Nigeria;

    Abstract : Can access to the global Internet improve health behaviour and outcomes in Africa? Providing health-related information through the Internet - free of charge, tailored specifically to patients' needs and accessible from anywhere, anytime - has proven to enhance users' mental and physical wellbeing in numerous researched cases. However, little is known about this relation in developing countries, where fast and internationally connected Internet arrived only a decade ago. READ MORE

  3. 13. Visitors at risk and heritage in peril? A case-study of Paris forbidden “catacombs”

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Charlotte Fafet; [2019]
    Keywords : Paris quarries; risk assessment; risk perception; cultural heritage; Technology and Engineering;

    Abstract : Paris is built upon an almost 300-kilometre long quarries network which reflects a part of the city’s history. While the access to most parts of it is forbidden due to its hazard, this underground network attracts many illegal visitors called Cataphiles. READ MORE

  4. 14. Efficient Enclave Communication through Shared Memory : A case study of Intel SGX enabled Open vSwitch

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakob Svenningsson; [2019]
    Keywords : ;

    Abstract : Open vSwitch is a virtual network switch commonly used to forward network packages between virtual machines. The switch routes network packets based on a set of flow rules stored in its flow tables. READ MORE

  5. 15. Cryptographic Attestation of the Origin of Surveillance Images

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Anton Eliasson; [2017]
    Keywords : Video signing; Video surveillance; H.264 AVC; Public-key cryptography; Axis Communications AB; Technology and Engineering;

    Abstract : A method is devised that provides authentication and integrity protection for H.264 encoded surveillance video. A digital signature is created at the H. READ MORE