Essays about: "secure protocol design"
Showing result 1 - 5 of 36 essays containing the words secure protocol design.
-
1. Comparative Analysis of In-Body to Out-Body Wireless CommunicationModules: Test Design and PerformanceEvaluation
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Wireless communication for biomedical equipment is rapidly improving with the invention of new technologies. Due to the absence of cables, wireless technology is a growing area of interest for biomedical applications. As technology advances, many gadgets are becoming smaller and more portable. READ MORE
-
2. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE
-
3. Privacy Enhancing Data Reporting System For Participatory Sensing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Privacy is a crucial aspect of any system involving user-supplied data. There exist multiple approaches to protecting the identity and secrecy of users in data submission systems. In this thesis, I consider the case of privacy-enhancing of data reporting in Participatory Sensing systems. READ MORE
-
4. PERFORMANCE ANALYSIS OF RADIUS AND DIAMETER AUTHENTICATION SYSTEMS IN 802.1X BASED SECURED NETWORKS
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : There is increasing attention to the security challenges of IT-OT networks. Mitigating these challenges needs sophisticated methods to secure such networks, especially by securing access to the network. One valuable strategy that provides security to the network access level is Port-Based Authentication. READ MORE
-
5. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE