Essays about: "open-source systems"

Showing result 1 - 5 of 328 essays containing the words open-source systems.

  1. 1. Blockchain-based e-voting system without digital ID: A Proof-of-Concept

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Leonard Schick; [2024]
    Keywords : Computer science; Cryptography; Crypto; Blockchain; Distributed systems; e-voting; electronic voting; Ethereum; Hyperledger; Hyperledger besu; Decentralization; Datavetenskap; Kryptografi; Blockkedja; Distribuerade system; e-röstning; Elektronisk röstning; Blinda signaturer; Ethereum; Hyperledger Besu; Decentralisering;

    Abstract : Electronic voting systems have the potential to offer a cost effective, secure and transparent way of communicating with the citizens, increasing trust and participation. However creating a secure open source electronic voting system providing confidentiality and transparency with sufficient performance has long been a challenge. READ MORE

  2. 2. Quantum Espionage

    University essay from KTH/Tillämpad fysik

    Author : Carlo Ninic Svensson; [2023]
    Keywords : Quantum Nano Photonics; SNSPD; OTDR; Nano Kvantfotonik; SNSPD; OTDR;

    Abstract : This thesis investigates the security of optical fiber communication and demonstrates the feasibility of eavesdropping using different tapping methods and superconducting nanowire single-photon detectors (SNSPDs). Methods for surveillance against fiber intrusion are also investigated. READ MORE

  3. 3. Code Synthesis for Heterogeneous Platforms

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zhouxiang Fu; [2023]
    Keywords : Code Synthesis; Heterogeneous Platform; Zero-Overhead Topology Infrastructure; Kodsyntes; Heterogen plattform; Zero-Overhead Topologi Infrastruktur;

    Abstract : Heterogeneous platforms, systems with both general-purpose processors and task-specific hardware, are largely used in industry to increase efficiency, but the heterogeneity also increases the difficulty of design and verification. We often need to wait for the completion of all the modules to know whether the functionality of the design is correct or not, which can cause costly and tedious design iteration cycles. READ MORE

  4. 4. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Mirna Ghazzawi; Adil Imran; [2023]
    Keywords : Intrusion Response System; Security; OSSEC; Radio Access Network; Baseband Units;

    Abstract : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. READ MORE

  5. 5. Big Data Analytics Using Apache Flink for Cybercrime Forensics on X (formerly known as Twitter)

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Manjunath Kakkepalya Puttaswamy; [2023]
    Keywords : Apache Flink; Apache Spark; Big Data; Twitter; X;

    Abstract : The exponential growth of social media usage has led to massive data sharing, posing challenges for traditional systems in managing and analyzing such vast amounts of data. This surge in data exchange has also resulted in an increase in cyber threats from individuals and criminal groups. READ MORE