Essays about: "file security"
Showing result 1 - 5 of 59 essays containing the words file security.
-
1. Low-latency transport protocols inactor systems : Performance evaluation of QUIC in Kompact
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Developers widely use actor frameworks to build highly distributed systems. However, modern actor frameworks are limited in their network implementations, with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) being the main protocols used for network communication. READ MORE
-
2. Enhancing Privacy in Cookieless Web Advertising : A Comparative Study of Multi-Party Computation and Trusted Execution Environment Solutions for Private Attribution Reporting
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The end of third-party cookies has driven the advertising market to seek new solutions. Third-party cookies were widely used to track users’ online activities across websites. However, the growing concern for privacy has led web browsers to put an end to this practice. READ MORE
-
3. Runtime of WebAssembly : A study into WebAssembly runtime
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : WebAssembly is Assembly-like code that is created by compiling other languages into Wasm. The Wasm file can then be run on the web at near native speed. The objective of this study is to find how WebAssemblys runtime compares to JavaScript and native. The study will also see if different browsers impact WebAssembly runtime. READ MORE
-
4. Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There are more and more parents that are considering to purchase smart watches for their kids. The children’s smart watches on the market are usually equipped with many practical functions like the GPS positioning, the camera and the messaging. READ MORE
-
5. An evaluation of edge deployment models for Kubernetes
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : With organisations moving away from in-house servers but still requiring love latency, high security and stability, edge nodes make their appearance as the best alternative. However, it is unclear which deploymen tmethod to use on those systems. This study explored the benefits and disadvantages of the multi-cluster and remote worker approach. READ MORE