Essays about: "extended security"
Showing result 16 - 20 of 76 essays containing the words extended security.
-
16. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE
-
17. Longitudinal characterization of X.509 revocation statuses : A framework for monitoring newly issued certificates from the most popular Certificate Transparency logs
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The X.509 landscape is one of the cornerstones of the internet today. It is used to establish trust between entities online. Revocations of X. READ MORE
-
18. Blue biotechnology : its role in the future of food
University essay from SLU/Department of Molecular SciencesAbstract : To provide healthy food and livelihoods to a growing population on Earth, while environmental issues becoming more adverse, as well as climate change becoming more critical, is one of today’s greatest challenges. By 2015 the United Nations come up with 17 Sustainable Development Goals (SDG’s) to tackle global challenges as poverty, global hunger, climate resilience, population growth control, achieving food security, and promotion of sustainable agriculture. READ MORE
-
19. Relational Symbolic Execution in WebAssembly
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : WebAssembly is a new low-level language used as a compilation target which runs in web browsers. As more code is run on the client side of a web application the issue of security of that code become more important. READ MORE
-
20. How do your customers trust you from their mobile phone? : A company's perspective to an extended understanding of the mobile technological factors needed to affect customers' trust on mobile applications or websites.
University essay from Linnéuniversitetet/Institutionen för marknadsföring (MF)Abstract : The purpose of this research is to provide companies with how they can affect customer’s trust through tools found within the three technological factors on mobile applications or websites. A research gap was discovered by the researchers due to the lack of in-depth exploration regarding this topic and took the opportunity to do research within this field. READ MORE