Essays about: "TLS"
Showing result 11 - 15 of 88 essays containing the word TLS.
-
11. Simulation of road traffic flow in Hangzhou
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Is it possible to increase traffic flows and decrease stand stills in rush hour traffic by tweaking existing traffic light signals? A vehicle’s engine running on idle is not useful in physical terms and emits unnecessary exhausts. By investigating and observing signal phase times on site in Hangzhou, China, an effort was made to find out if it was possible to get better flow and thus lower emissions by changing the traffic signal programs. READ MORE
-
12. The Everyday Internet, a Minefield in Disguise : Characterization of different types of domains including malicious and popularity
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Today, security has become a growing concern for all internet users, where technology is developing faster than its security is implemented, which leads to insecure domains. In this thesis, we look at the reality of today’s domains and research if some categories of domains are safer than others and the reason behind it. READ MORE
-
13. Assessing the Security of Internal Automotive Networks
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE
-
14. Design and evaluation of an inter-core QUIC connection migration approach for intra-server load balancing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the emergence of novel cloud applications and their critical latency demand [1], Quick UDP Internet Connection (QUIC) [2] was proposed as a new transport protocol that is promising to reduce the connection establishment overhead while providing security properties similar to Transport Layer Security (TLS) [3]. However, without an efficient task scheduling mechanism, the high cost for encryption and decryption in QUIC can easily lead to load imbalance among multiple Central Processing Unit (CPU) cores and thus cause a high tail latency. READ MORE
-
15. Collecting and analyzing Tor exit node traffic
University essay from Blekinge Tekniska Högskola/Fakulteten för datavetenskaper; Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With increased Internet usage occurring across the world journalists, dissidents and criminals have moved their operations online, and in turn, governments and law enforcement have increased their surveillance of their country’s networks. READ MORE