Essays about: "secure protocol"
Showing result 1 - 5 of 164 essays containing the words secure protocol.
-
1. Comparative Analysis of In-Body to Out-Body Wireless CommunicationModules: Test Design and PerformanceEvaluation
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Wireless communication for biomedical equipment is rapidly improving with the invention of new technologies. Due to the absence of cables, wireless technology is a growing area of interest for biomedical applications. As technology advances, many gadgets are becoming smaller and more portable. READ MORE
-
2. Evaluating intrusion detection points in an end-to-end solution
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE
-
3. Proactive Command Proxy : Simplifying the use of Proactive Commands
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With phones becoming more and more advanced telecom operators findthemselves in need of interacting with the operating system of the customersphone more and more. They also prefer to do this with their own infrastructureinstead of through an app that relies on the operating system developer. READ MORE
-
4. Enhancing Privacy in Cookieless Web Advertising : A Comparative Study of Multi-Party Computation and Trusted Execution Environment Solutions for Private Attribution Reporting
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The end of third-party cookies has driven the advertising market to seek new solutions. Third-party cookies were widely used to track users’ online activities across websites. However, the growing concern for privacy has led web browsers to put an end to this practice. READ MORE
-
5. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE