Essays about: "Säker Kommunikation"
Showing result 1 - 5 of 67 essays containing the words Säker Kommunikation.
-
1. Operationssjuksköterskors erfarenheter av patientsäker vård intraoperativt : Operating room nurses´experiences of patient-safe care intraoperative
University essay from Karlstads universitet/Institutionen för hälsovetenskaper (from 2013)Abstract : Introduktion: Perioperativ omvårdnad är den specifika omvårdnaden inom operationssjukvård och omfattar tre faser; den preoperativa fasen, den intraoperativa fasen och den postoperativa fasen. Vårdandet som sker i operationssalen kallas intraoperativ fas. READ MORE
-
2. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE
-
3. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE
-
4. Comparison of Operator and Nonoperator Managed 5G Non-Public Networks (NPNs): Implications for Network Architectures and Cost Structures
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the evolving landscape of communication technologies, 5G Non-Public Network (NPN) enables organizations, enterprises, and industries to have specialized, highperformance connectivity tailored to their needs. It operates independently of Mobile Public Networks (MNOs) and is designed to provide secure, low-latency, and reliable communication in two broad types: standalone or public-integrated. READ MORE
-
5. Cost and efficiency comparison of Quantum Key Distribution schemes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The development of quantum computing exposes critical vulnerabilities in classical encryption systems. However, quantum computing also enables new methods of secure communication. Quantum key distribution (QKD) is one class of such methods. READ MORE