Essays about: "thesis in securing data"

Showing result 21 - 25 of 71 essays containing the words thesis in securing data.

  1. 21. Secure IPC to Enable Highly Sensitive Communication in a Smartphone Environment with a BYOD Setup

    University essay from Linköpings universitet/Informationskodning

    Author : Daniel Holmberg; [2021]
    Keywords : ;

    Abstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE

  2. 22. Evaluation of Network-Layer Security Technologies for Cloud Platforms

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bruno Marcel Duarte Coscia; [2020]
    Keywords : Overlay network; Network security; IPsec; Slack nebula; Nebula; Noise framework; Noise protocol; Överlagring Nätverk; Nätverkssäkerhet; IPsec; Slack nebula; Nebula; Noise ramverk; Noise protokoll;

    Abstract : With the emergence of cloud-native applications, the need to secure networks and services creates new requirements concerning automation, manageability, and scalability across data centers. Several solutions have been developed to overcome the limitations of the conventional and well established IPsec suite as a secure tunneling solution. READ MORE

  3. 23. A Concept for an Intrusion Detection System over Automotive Ethernet

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Hanna Lindwall; Pontus Ovhagen; [2020]
    Keywords : Intrusion Detection System; Deep Packet Inspection; Specification-based Detection; Anomaly-based Detection; V2G; Automotive Ethernet.; Technology and Engineering;

    Abstract : A modern automotive vehicle is a complex technical system, containing many electronic, mechanical, and software parts. Typically, a high-end vehicle contains 70 or more electronic control units (ECUs) on average. READ MORE

  4. 24. Efficient Security Protocol for RESTful IoT devices

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Karnarjun Kantharajan; Sahar Shirafkan; [2020]
    Keywords : Internet of Things IoT ; TLS 1.2 1.3; DTLS 1.2; OSCORE; CoAP; Security Protocols.; Technology and Engineering;

    Abstract : In this thesis, we presented comparisons with respect to Energy Consumption, bandwidth, the Constraint application protocol (CoAP) transaction time and throughput for four different security protocols. We simulated and implemented the Datagram Transport Layer Protection (DTLS) version 1.2, Transport Layer Protocol (TLS) version 1.2 & 1. READ MORE

  5. 25. End-Of-Life Wind Turbines in the EU : An Estimation of the NdFeB-Magnets and Containing Rare Earth Elements in the Anthropogenic Stock of Germany and Denmark

    University essay from Uppsala universitet/Institutionen för geovetenskaper

    Author : Lisa Welzel; [2019]
    Keywords : rare earth elements; neodymium; dysprosium; wind turbines; permanent magnets; recycling; recovery; closing the loop; urban mining; sustainability; sällsynta jordartsmetaller; neodymium; dysprosium; vindturbiner; permanenta magneter; återvinning; cirkulärt system; hållbarhet;

    Abstract : Securing rare earth elements (REE) for a stable supply require sustainable management strategies in Europe due to a missing local primary production and a dependence on China as the main producer of REE. These elements, like neodymium (Nd) and dysprosium (Dy), are contained in permanent magnets (PM) (mostly NdFeB-magnets) in wind turbines. READ MORE