Essays about: "cryptography and network security"

Showing result 16 - 20 of 33 essays containing the words cryptography and network security.

  1. 16. Security Evaluation of the Electronic Control Unit Software Update Process

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Liis Jaks; [2014]
    Keywords : ;

    Abstract : A modern vehicle is controlled by a distributed network of embedded devices - Electronic Control Units. The software of these devices is updated over an easily accessible and standardised diagnostic interface. Their hardware capabilities are very low, and thereby the security implementations are fairly minimalistic. READ MORE

  2. 17. Access Control in the Internet of Things

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Denis Sitenkov; [2014]
    Keywords : ;

    Abstract : The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. READ MORE

  3. 18. Security for Cloud Based Services

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Sabrina Ali Tandra; S.M. Sarwarul Islam Rizvi; [2014]
    Keywords : cloud computing; security; risk; vulnerability; performance; Molntjänster; säkerhet; risk; sårbarhet; utförande;

    Abstract : Cloud computing is a new buzzword in the modern information technology world. Today cloud computing can be considered as a service, similar to the way that electricity is considered a service in urban areas. A cloud user can utilize different computing resources (e.g. READ MORE

  4. 19. Access Control in the Internet of Things

    University essay from RISE./SICS

    Author : Sitenkov Denis; [2014]
    Keywords : ;

    Abstract : The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. READ MORE

  5. 20. Implementation and Evaluation of Datagram Transport Layer Security (DTLS) for the Android Operating System

    University essay from KTH/Kommunikationsnät

    Author : Daniele Trabalza; [2013]
    Keywords : ;

    Abstract : Smartphones are nowadays a tool that everyone posses. With the replacement of the IPv4 with the IPv6 it is possible to connect to the Internet an extremely large number of electronic devices. READ MORE