Advanced search

Showing result 1 - 5 of 34 essays matching the above criteria.

  1. 1. Negotiating Gender and Sexual Norms: Queer Women and Non-Binary Individuals' Experiences and Semiotic Interpretations on Heteronormative Dating Applications

    University essay from Lunds universitet/Graduate School

    Author : Eloise Rose Félicie Lanoir; [2023]
    Keywords : Dating Applications; Queerness; Heteronormativity; Gender Norms; Semiotic Interpretation.; Social Sciences;

    Abstract : This thesis explores how queer women and non-binary individuals navigate gender norms and heteronormativity on dating apps. It also gives insights about how queer women and gender non-conforming users semiotically perceive and interpret gender and sexuality through online profiles. READ MORE

  2. 2. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  3. 3. Enclave Host Interface for Security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anmol Sinha; [2022]
    Keywords : Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code; Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code;

    Abstract : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. READ MORE

  4. 4. Keystroke Classification of Motion Sensor Data - An LSTM Approach

    University essay from Lunds universitet/Matematisk statistik

    Author : Marcus Patricks; [2021]
    Keywords : Neural Networks; Keystroke Dynamics; LSTM-Networks; Accelerometer; Gyroscope; Mobile Sensors; Transfer Learning; Mathematics and Statistics;

    Abstract : With mobile phones often being used to type sensitive information, it is important that they remain secure and leak no information. One conceivable channel for information leakage, though, is the motion sensors accelerometer and gyroscope, sensors that require no permission to be used by an app. READ MORE

  5. 5. Control your home with augmented reality

    University essay from Lunds universitet/Ergonomi och aerosolteknologi

    Author : Daniel Tovesson; [2020]
    Keywords : Augmented reality; Internet of Things; Smart homes; ARKit; Interaction design; User-Centered Design; Technology and Engineering;

    Abstract : As connected devices, or Internet of Things (IoT), are becoming increasingly more common in our homes we need a way to control them remotely. Remote control can be achieved with native applications created by the providers of these IoT devices which can result in you needing several applications to control your IoT devices. READ MORE