Essays about: "secure protocol"
Showing result 16 - 20 of 164 essays containing the words secure protocol.
-
16. Determining whether the Hövding bicycle airbag is secure against cyber attacks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis is about cyber-security and penetration testing. More specifically it concerns penetration testing of a Hövding bicycle airbag which is a smart alternative to a traditional bicycle helmet. The thesis focuses on exploiting Bluetooth Low Energy, firmware analysis and reverse engineering. READ MORE
-
17. Performance Evaluation of Various QUIC Implementations : Performance and Sustainability of QUIC Implementations on the Cloud
University essay from Luleå tekniska universitet/DatavetenskapAbstract : QUIC is a new secure multiplexed transport protocol built on top of UDP. This general-purpose transport protocol aims to provide the lowest connection latency possible and solve the shortcomings of TCP, UDP, and current problems of the internet. READ MORE
-
18. PERFORMANCE ANALYSIS OF RADIUS AND DIAMETER AUTHENTICATION SYSTEMS IN 802.1X BASED SECURED NETWORKS
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : There is increasing attention to the security challenges of IT-OT networks. Mitigating these challenges needs sophisticated methods to secure such networks, especially by securing access to the network. One valuable strategy that provides security to the network access level is Port-Based Authentication. READ MORE
-
19. Bootstrapping Secure Sensor Networks in the Internet of Things
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Internet of Things has become an integral part of modern society and continues to grow and evolve. The devices are expected to operate in various conditions and environments while securely transmitting sensor data and keeping low manufacturing costs. Security for the Internet of Things is still in its infancy and a serious concern. READ MORE
-
20. Evaluating the Single Sign-On Protocol OpenID Connect for an Electronic Document Signature Service From a Security Perspective
University essay from Linköpings universitet/Programvara och systemAbstract : Today, there is an increasing demand for authentication services to provide authentication to users on the internet. One example of an authentication protocol is OpenID Connect. It is used by for example Google to provide single sign-on functionality to millions of users. READ MORE