Essays about: "Security Protocol for the Internet"

Showing result 11 - 15 of 118 essays containing the words Security Protocol for the Internet.

  1. 11. An Open and Nonproprietary Decentralized Messaging Protocol : Operating Entirely on the Internet Computer Blockchain

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gabriel Ellebrink; [2022]
    Keywords : Messaging protocol; Decentralized; Blockchain; Smart contract; Internet computer; Dfinity; Meddelandeprotokoll; Decentraliserad; Blockkedja; Smarta kontrakt; Internet computer; Dfinity;

    Abstract : Even when end-to-end encryption is used in centralized messaging services, problems related to security, privacy, availability, and transparency remain. These problems can be avoided or reduced by using a decentralized architecture. READ MORE

  2. 12. Security in Smart Locks : Do Consumers Care?

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Jonathan Zedig; [2022]
    Keywords : Smart locks; Internet of Things; Security; Smart home protocol;

    Abstract : Background. Smart door locks are either replacing or adding on to more regular mechanical locks today. They come in many different sizes and with many different functionalities. Today, most consumer advertisements focus on the functionalities of the locks and not so much on security. READ MORE

  3. 13. Determining whether the Hövding bicycle airbag is secure against cyber attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Henrik Mellin; [2022]
    Keywords : Penetrationtesting; Internet of Things; Threatmodeling; BluetoothLowEnergy; Firmware analysis; Reverse engineering; Penetrationstestning; Sakernasinternet; Hotmodellering; BluetoothLowEnergy; Analys of fast programvara; Baklängeskonstruktion;

    Abstract : This thesis is about cyber-security and penetration testing. More specifically it concerns penetration testing of a Hövding bicycle airbag which is a smart alternative to a traditional bicycle helmet. The thesis focuses on exploiting Bluetooth Low Energy, firmware analysis and reverse engineering. READ MORE

  4. 14. Bootstrapping Secure Sensor Networks in the Internet of Things

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Edman; [2022]
    Keywords : Internet of Things; Machine-to-machine communications; Internet security; Cryptographic protocols; Sakernas internet; Maskin-till-maskin kommunikation; Säkerhet på internet; Kryptografiska protokoll;

    Abstract : The Internet of Things has become an integral part of modern society and continues to grow and evolve. The devices are expected to operate in various conditions and environments while securely transmitting sensor data and keeping low manufacturing costs. Security for the Internet of Things is still in its infancy and a serious concern. READ MORE

  5. 15. Evaluating the Single Sign-On Protocol OpenID Connect for an Electronic Document Signature Service From a Security Perspective

    University essay from Linköpings universitet/Programvara och system

    Author : Ludvig Thor; [2022]
    Keywords : OIDC; Single sign-on; Security;

    Abstract : Today, there is an increasing demand for authentication services to provide authentication to users on the internet. One example of an authentication protocol is OpenID Connect. It is used by for example Google to provide single sign-on functionality to millions of users. READ MORE