Essays about: "thesis for NETWORK SECURITY virtual"

Showing result 11 - 15 of 29 essays containing the words thesis for NETWORK SECURITY virtual.

  1. 11. Implementation and Benchmarking of a Crypto Processor for a NB-IoT SoC Platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Sébastien Fuhrmann; Luis Cavo; [2018]
    Keywords : 3GPP; IoT; HLS; security; cryptography; AES; SNOW; ZUC; hardware; ASIC; confidentiality; integrity; cipher; Technology and Engineering;

    Abstract : The goal of this Master’s Thesis is to investigate the implementation of cryptographic algorithms for IoT and how these encryption systems can be integrated in a NarrowBand IoT platform. Following 3rd Generation Partnership Project (3GPP) specifications, the Evolved Packet System (EPS) Encryption Algorithms (EEA) and EPS Integrity Algorithms (EIA) have been implemented and tested. READ MORE

  2. 12. Trusted Execution Environments for Open vSwitch : A security enabler for the 5G mobile network

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Khalid Elbashir; [2017]
    Keywords : Open vSwitch; SDN; Trusted Execution Environment; SGX; Cloud Computing; Open vSwitch; SDN; mjukvarudefinierade nätverk; SGX; molntjänster;

    Abstract : The advent of virtualization introduced the need for virtual switches to interconnect virtual machines deployed in a cloud infrastructure. With Software Defined Networking (SDN), a central controller can configure these virtual switches. Virtual switches execute on commodity operating systems. READ MORE

  3. 13. Lightweight User Agents

    University essay from Linköpings universitet/Artificiell intelligens och integrerad datorsystem

    Author : Martin Estgren; [2016]
    Keywords : Template Matching; GUI; Intelligent Agents; Computer Vision; Graphical User Interface;

    Abstract : The unit for information security and IT architecture at The Swedish Defence Research Agency (FOI) conducts work with a cyber range called CRATE (Cyber Range and Training Environment). Currently, simulation of user activity involves scripts inside the simulated network. READ MORE

  4. 14. Evaluation of VPNs

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Mustafa Al-Abaychi; Joanna Ellvin; [2016]
    Keywords : ;

    Abstract : This thesis evaluated the performance of four different virtual private networks (VPNs): IP security (IPsec), OpenVPN, SSH port forwarding and SSH using virtual interfaces. To evaluate these VPNs, three comparative performance tests were carried out in which the maximum throughput of each VPN was measured. READ MORE

  5. 15. Security Analysis of a Software Defined Wide Area Network Solution

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Ashok Rajendran; [2016]
    Keywords : SD-WAN; Nuage VNS; virtual network functions; security;

    Abstract : Enterprise wide area network (WAN) is a private network that connects the computers and other devices across an organisation's branch locations and the data centers. It forms the backbone of enterprise communication. Currently, multiprotocol label switching (MPLS) is commonly used to provide this service. READ MORE