Essays about: "Network Access Protection"
Showing result 11 - 15 of 39 essays containing the words Network Access Protection.
-
11. Authentication and Identification of Sensor Nodes to Avoid Unauthorized Access in Sensor Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the increasing popularity of Internet of Things (IoT), network connected devices and sensors, to easier collect data is security an aspect that must not be forgotten. When sensitive data, such as personal or private data, is sent over the network without protection can it easier be obtained by anyone who want to get their hands on it. READ MORE
-
12. Can Access to Fast Internet in Africa Promote HIV Awareness and Prevention? - Evidence from Nigeria
University essay from Handelshögskolan i Stockholm/Institutionen för nationalekonomiAbstract : Can access to the global Internet improve health behaviour and outcomes in Africa? Providing health-related information through the Internet - free of charge, tailored specifically to patients' needs and accessible from anywhere, anytime - has proven to enhance users' mental and physical wellbeing in numerous researched cases. However, little is known about this relation in developing countries, where fast and internationally connected Internet arrived only a decade ago. READ MORE
-
13. Visitors at risk and heritage in peril? A case-study of Paris forbidden “catacombs”
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : Paris is built upon an almost 300-kilometre long quarries network which reflects a part of the city’s history. While the access to most parts of it is forbidden due to its hazard, this underground network attracts many illegal visitors called Cataphiles. READ MORE
-
14. Efficient Enclave Communication through Shared Memory : A case study of Intel SGX enabled Open vSwitch
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Open vSwitch is a virtual network switch commonly used to forward network packages between virtual machines. The switch routes network packets based on a set of flow rules stored in its flow tables. READ MORE
-
15. Cryptographic Attestation of the Origin of Surveillance Images
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : A method is devised that provides authentication and integrity protection for H.264 encoded surveillance video. A digital signature is created at the H. READ MORE