Essays about: "secure audio"
Showing result 1 - 5 of 7 essays containing the words secure audio.
-
1. Homomorphic Encryption for Audio Conferencing
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Homomorphic encryption (HE) enables computations on encrypted data making it possible to perform calculations on a server without sharing the secret key for decryption. HE is relatively new and has seen significant improvements in recent years in terms of speed of encryption, decryption, operations, and the number of operations possible to perform in a row without damaging the ciphertext. READ MORE
-
2. Can a robot’s confidentiality be trusted?
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today’s society is becoming more and more connected, all in order to make the availability as user-friendly as possible. But what problems they can lead to if it is not done in a safe way is something that this thesis will test. In this thesis, a cyber security analysis of a connected product is performed. READ MORE
-
3. Territorial Copyright Licenses for Audio-visual Content:Steps Towards Overruling the Principle of Copyright Territoriality?
University essay from Uppsala universitet/Juridiska institutionenAbstract : The thesis evaluates the competition law and new legislation adopted under the Digital Single Market Strategy framework and itf effect on the principle of copyright territoriality and current territorial licensing practices. The interest of consumers to access cultural content, the interest of right holders to exploit their work in exchange for renumeration and interest of distributors to secure a broader audience and high income are interests which are taken into account. READ MORE
-
4. Out-of-band transfer with Android to configure pre-shared secrets into sensor nodes
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Applications based on Wireless Sensor Networks are making their way into all kinds of industries. Today, they can do anything from off-loading hospitals by monitoring patients in their homes to regulating production lines in factories. More often than not, they perform some kind of surveillance and tracking. READ MORE
-
5. Audio quality perception of SCIP encrypted voice transmission over low quality radio links
University essay from Uppsala universitet/Signaler och SystemAbstract : Tactical radio communications used in military applications hasstrict requirements regarding security and has to be operable inrough environments in which there may be disturbances and disruptionson a radio link. The performance of the Secure CommunicationInteroperability Protocol (SCIP) operating in an asynchronouscommunication network with various levels of packet loss isinvestigated and found inadequate mainly due to problems withcryptographic synchronization between the transmitting and receivingunits. READ MORE