Essays about: "Network Access Protection"

Showing result 6 - 10 of 39 essays containing the words Network Access Protection.

  1. 6. The E-krona and Traceability of Your Payment Data : An analysis of the fundamental differences and privacy-related impacts of the Riksbank’s e-krona pilot in comparison with card-based transactions

    University essay from Uppsala universitet/Juridiska institutionen

    Author : Lovisa Stenbacka; [2022]
    Keywords : e-krona; traceability; payment data; data protection; law; financial secrecy; AML; rule of law; democracy; technology; legal informatics; legal policy; law and technology; constitutional provisions; DLT; blockchain; wallet-id; information security; fintech; financial technology; the Riksbank; central bank; money; Riksbanken; finansiell teknologi; e-kronan; digital centralbanksvaluta; statlig kontroll; centralbank; konstitutionella förpliktelser; demokrati; skydd för betaldata; skydd för personuppgifter; finansiell sekretess; banksekretess; penningtvätt; informationsteknologi; rättsinformatik; rättspolitik;

    Abstract : The Riksbank is currently investigating the possibility of producing a Central Bank Digital Currency in Sweden, called “e-krona”, implemented through an “e-krona network” on a platform based on Distributed Ledger Technology. By applying the methodology of legal dogmatics, legal informatics, and a legal policy perspective, this thesis examines and analyses some of the fundamental differences in Sweden’s current payment system for transactions at the point of sale, comparing debit card-based transactions with payments using the model of the Riksbank’s e-krona pilot. READ MORE

  2. 7. Assessing the Security of Internal Automotive Networks

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Anas Alkoutli; Joakim Anderlind; Carl-Johan Björnson; Mathias Drage; Morgan Thowsen; Antonia Welzel; [2021-09-14]
    Keywords : Vehicle; Network Security; CAN; Ethernet;

    Abstract : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE

  3. 8. The Application of Blockchain for the Intellectual Property Protection

    University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Author : Marie Francoise Mbaye; [2021]
    Keywords : Blockchains; Smart contracts; Intellectual Property Rights; European Union law; EU law; Law and Political Science;

    Abstract : With a far going protection of IP rights, the EU aims to protect the assets of companies which invested in innovative products. If the EU framework provides a far going mechanism of protection of IP rights, the complexity and the cost of this mechanism have been a barrier to the access of IP rights. READ MORE

  4. 9. Syrian Secondary Migration : A study on push and pull factors behind the irregular migration of Syrians from Turkey to Europe

    University essay from Malmö universitet/Institutionen för globala politiska studier (GPS)

    Author : Mohamad Kouider; [2021]
    Keywords : Syrian migrants; Turkey; push-pull factors; social network theory; secondary migration; Europe;

    Abstract : This research aims to gain a detailed understanding of the push and pull factors that lead many Syrians in Turkey to migrate to Europe. Syrians are pushed to migrate for various reasons, including socio-economic difficulties in Turkey. READ MORE

  5. 10. Using Neural Networks to Identify Infected Files for Protection against Ransomware

    University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska högskolan

    Author : David Eriksson; [2020]
    Keywords : ;

    Abstract : This master thesis report presents the development process and result of an artificial neural network model that can predict if a file has been encrypted. It was developed as a stand alone component that can be implemented in to a backup system. READ MORE