Essays about: "Säker Kommunikation"

Showing result 1 - 5 of 67 essays containing the words Säker Kommunikation.

  1. 1. Operationssjuksköterskors erfarenheter av patientsäker vård intraoperativt : Operating room nurses´experiences of patient-safe care intraoperative

    University essay from Karlstads universitet/Institutionen för hälsovetenskaper (from 2013)

    Author : Basel Kayed; Åsa Von Schéele; [2024]
    Keywords : Intraoperativt; Operationssjuksköterska; Patientsäkerhet;

    Abstract : Introduktion: Perioperativ omvårdnad är den specifika omvårdnaden inom operationssjukvård och omfattar tre faser; den preoperativa fasen, den intraoperativa fasen och den postoperativa fasen. Vårdandet som sker i operationssalen kallas intraoperativ fas. READ MORE

  2. 2. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE

  3. 3. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ossian Dillner; [2023]
    Keywords : Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE

  4. 4. Comparison of Operator and Nonoperator Managed 5G Non-Public Networks (NPNs): Implications for Network Architectures and Cost Structures

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Amina Ahmed; [2023]
    Keywords : ;

    Abstract : In the evolving landscape of communication technologies, 5G Non-Public Network (NPN) enables organizations, enterprises, and industries to have specialized, highperformance connectivity tailored to their needs. It operates independently of Mobile Public Networks (MNOs) and is designed to provide secure, low-latency, and reliable communication in two broad types: standalone or public-integrated. READ MORE

  5. 5. Cost and efficiency comparison of Quantum Key Distribution schemes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Lidbjörk; Rasmus Söderström Nylander; [2023]
    Keywords : ;

    Abstract : The development of quantum computing exposes critical vulnerabilities in classical encryption systems. However, quantum computing also enables new methods of secure communication. Quantum key distribution (QKD) is one class of such methods. READ MORE