Essays about: "secure protocol"

Showing result 21 - 25 of 164 essays containing the words secure protocol.

  1. 21. Ethical hacking of a premium robot vacuum : Penetration testing of the Roborock S7 robot vacuum cleaner

    University essay from KTH/Hälsoinformatik och logistik

    Author : Tobias Dahlberg Sundström; Johan Nilsson; [2022]
    Keywords : Ethical hacking; IoT; DREAD; STRIDE; Grey-box testing; Robot vacuum; Etiskt hackande; IoT; DREAD; STRIDE; Grey-box testande; Robotdammsugare;

    Abstract : With the advancements made in the field of data science, smart IoT devices are be-coming increasingly common. Consequently, this creates an increased number of targets for hackers to potentially exploit. This is a study about ethically hacking a robot vacuum, the Roborock S7, and evaluating the security of the target system. READ MORE

  2. 22. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiao Jin; [2022]
    Keywords : Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE

  3. 23. The Impact of Good Navigation and Trust in E-commerce : The importance of navigation and trustworthiness when creating a web application for selling emission allowances

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Lovisa Andreasson; Agnes Asp; Eric Gustafsson; Edvin Halling; Johan Kristiansson; Axel Lindhe; Anton Nordin; Jakob Normell; Gabriel Spjuth; [2022]
    Keywords : Navigability; trustworthiness; usability; design;

    Abstract : The purpose of this report was to study how the design of a web application can induce trust and navigability. To study this, a web application was created where the private consumer can buy a part of an emission allowance, tailored to the consumers’ specific needs. READ MORE

  4. 24. Termochip för hästar : jämförelse med rektal temperatur och beteende vid mätning

    University essay from SLU/Dept. of Clinical Sciences

    Author : My Monto Zale; [2022]
    Keywords : beteende; chip; häst; häst-; microchip; sensor; temperatur; termochip;

    Abstract : Temperaturmätning är vanligt förekommande inom djursjukvård för att ge en indikation på djurets hälsostatus. Vanligt är att temperaturen mäts rektalt men detta accepteras inte av alla patienter. READ MORE

  5. 25. Measuring The Adoption and The Effects of RPKI Route Validation and Filtering : Through active control plane and data plane measurements

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sergio Ricardo Hernández Torres; [2022]
    Keywords : BGP; IP; Routing; RPKI; Tier-1 ISP;

    Abstract : The BGP (Border Gateway Protocol) is responsible for establishing routing at the core of the Internet, yet it was not designed with security in mind. The Internet routing protocol is currently not secure — but its security can be enhanced. READ MORE