Advanced search

Showing result 1 - 5 of 75 essays matching the above criteria.

  1. 1. Evaluation and Optimization of LTE-V2X Mode 4 under Aperiodic Messages of Variable Size

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Md Mamunur Rashid; [2023]
    Keywords : LTE-V2X; aperiodic; variable size; CAM; Technology and Engineering;

    Abstract : Vehicular networks connect vehicles for improved road safety and efficiency with the assistance of wireless information exchange. Vehicular networks are based on the frequent broadcast of awareness messages referred to as CAM (Cooperative Awareness Messages) or BSM (Basic Safety Message) in the ETSI and SAE standards, respectively. READ MORE

  2. 2. Secure satellite internet usage in high-risk areas

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Andreas Kvant; Carl Johansson; [2023]
    Keywords : satellite internet; high-risk area; threats; risks; mitigations; satellit internet; högriskområden; hot; risker; åtgärder;

    Abstract : Background. In high-risk areas, a reliable and secure internet connection is not always guaranteed. READ MORE

  3. 3. Access Management in Organizations : A Comprehensive Study and Scenario-based Analysis

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Anna Bergström; Emily Berghäll; [2023]
    Keywords : access management; access control; access control models; role-based access control; attribute-based access control; ACM; access rights; organization; organization-based; scenario-based; evaluation;

    Abstract : Access management is an important part of the security of an organization as it limits access to sensitive material such as code and files. Therefore, access management can be a vital part of preventing leaks of information in regard to company-sensitive information or information about employees or users. READ MORE

  4. 4. Enclave Host Interface for Security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anmol Sinha; [2022]
    Keywords : Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code; Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code;

    Abstract : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. READ MORE

  5. 5. Developing a passwordgenerating software : Regarding password memorability and security

    University essay from KTH/Hälsoinformatik och logistik

    Author : Anton Mogaddam; Khan Muhammad; [2022]
    Keywords : Passwords; keyboard patterns; password memorability; Python; Hashcat; Lösenord; tangentbords mönster; minnesvärdhet för lösenord; Python; Hashcat;

    Abstract : With the growth of digital information and technology, more websites require user authentication to access individuals' sensitive information. The main form of authentication are passwords which if chosen unwisely can easily be guessed or cracked by someone else. This is why it is important to create safe yet memorable passwords. READ MORE