Essays about: "secure network 2010"

Showing result 21 - 25 of 26 essays containing the words secure network 2010.

  1. 21.  A secure mobile phone-based interactive logon in Windows

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Oleksandr Bodriagov; [2010]
    Keywords : ;

    Abstract : Password-based logon schemes have many security weaknesses. Smart card and biometric based authentication solutions are available as a replacement for standard password-based schemes for security sensitive environments. However, the cost of deployment and maintenance of these systems is quite high. READ MORE

  2. 22. Security Evaluation of Intel's Active Management Technology

    University essay from KTH/Kommunikationssystem, CoS

    Author : Vassilios Ververis; [2010]
    Keywords : AMT; vPRO; out of band; remote management; backdoor; stealth malware; security;

    Abstract : Intel’s Active Management Technology (AMT) is, a hardware-based platform for remotely managing and securing personal computers out of band. AMT is available in most desktop and notebooks PCs equipped with an Intel Core 2, Centrino, or Centrino 2 processors with support for vPro technology. READ MORE

  3. 23. Requirements for a secure and efficientAuthentication System for a large organizationJuan Carlos

    University essay from Institutionen för datavetenskap, fysik och matematik, DFM

    Author : Juan Carlos Crespo; [2010]
    Keywords : Authentication; Authorization; Accounting; AAA; Identification; Network Security;

    Abstract : In this thesis, a full review on what are the minimum requirements needed to perform an Authentication System is explained. While building the system we have in consideration the users of it, the security needed for each of the resources that must be accessed by the users and what methods can be applied to access to these resources. READ MORE

  4. 24. IKEA Planning Year Cycle

    University essay from Lunds universitet/Produktionsekonomi

    Author : Christian Lycke Bladh; Fredrik Starling; [2010]
    Keywords : Technology and Engineering;

    Abstract : IKEA is currently in the progress of integrating Business Process Management (BPM) into the current functional organization. In order to investigate how to increase the accuracy of the capacity planning, IKEA saw a need of examining the processes connected to Plan & Secure Capacity, a sub process to the main process Supplying. READ MORE

  5. 25. Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : IRSHAD ULLAH; SHOAIB UR REHMAN; [2010]
    Keywords : MANET; Black Hole; Routing Protocols;

    Abstract : Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). READ MORE