Essays about: "sekretess"
Showing result 11 - 15 of 45 essays containing the word sekretess.
-
11. Machine Learning with Reconfigurable Privacy on Resource-Limited Edge Computing Devices
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Distributed computing allows effective data storage, processing and retrieval but it poses security and privacy issues. Sensors are the cornerstone of the IoT-based pipelines, since they constantly capture data until it can be analyzed at the central cloud resources. However, these sensor nodes are often constrained by limited resources. READ MORE
-
12. Adoption of Artificial Intelligence in Commercial Real Estate : Data Challenges, Transparency and Implications for Property Valuations
University essay from KTH/Fastigheter och byggandeAbstract : Investment decision in the property market is closely connected to property valuation. Thus, accuracy of valuation results and deep analysis of the market is essential. Artificial Intelligence (AI) models have been successfully adopted in different fields and markets. READ MORE
-
13. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE
-
14. Parasitic Tracking Mobile Wireless Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. READ MORE
-
15. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE