Essays about: "TLS Protocol"
Showing result 1 - 5 of 38 essays containing the words TLS Protocol.
-
1. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE
-
2. Securing LwM2M with Mbed TLS in Contiki-NG
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE
-
3. Cloud-based video stabilization processing in real-time
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : On-device real-time video stabilization has become a common feature of modernsmartphones. This processing technique improves quality but is an expensive processthat requires significant resources from the devices themselves. By offloading thisprocess to the cloud, much better hardware could be utilized to perform these tasks. READ MORE
-
4. The Everyday Internet, a Minefield in Disguise : Characterization of different types of domains including malicious and popularity
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Today, security has become a growing concern for all internet users, where technology is developing faster than its security is implemented, which leads to insecure domains. In this thesis, we look at the reality of today’s domains and research if some categories of domains are safer than others and the reason behind it. READ MORE
-
5. Design and evaluation of an inter-core QUIC connection migration approach for intra-server load balancing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the emergence of novel cloud applications and their critical latency demand [1], Quick UDP Internet Connection (QUIC) [2] was proposed as a new transport protocol that is promising to reduce the connection establishment overhead while providing security properties similar to Transport Layer Security (TLS) [3]. However, without an efficient task scheduling mechanism, the high cost for encryption and decryption in QUIC can easily lead to load imbalance among multiple Central Processing Unit (CPU) cores and thus cause a high tail latency. READ MORE