Search for dissertations about: "security protocol"

Showing result 1 - 5 of 64 swedish dissertations containing the words security protocol.

  1. 1. CryptoNET : Generic Security Framework for Cloud Computing Environments

    Author : Abdul Ghafoor Abbasi; Sead Muftic; Antonio F. Gómez Skarmeta; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Generic Security Object; CryptoNET; Security; Framework; Information technology; Informationsteknologi; SRA - ICT; SRA - Informations- och kommunikationsteknik;

    Abstract : The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. READ MORE

  2. 2. A layered approach to computer network security

    Author : Florian-Daniel Otel; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; computer security; computer networking; firewalls; TCP; link-layer protocol; packet filters;

    Abstract : .... READ MORE

  3. 3. Security of Time Synchronization for PMU-based Power System State Estimation: Vulnerabilities and Countermeasures

    Author : Ezzeldin Shereen; György Dán; Joe H. Chow; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Phasor measurements unit; Time synchronization; Power system state estimation; Network Security; Time synchronization attacks; Precision time protocol; Machine learning; Electrical Engineering; Elektro- och systemteknik;

    Abstract : Phasor Measurement Units (PMUs) constitute an emerging technology that is essential for various smart grid applications such as phase angle monitoring, power oscillation damping, fault localization, and linear state estimation. To obtain precise PMU measurements of voltage and current phasors, time synchronization in the order of 1 microsecond is typically required. READ MORE

  4. 4. Towards Secure Synchronous Communication Architectures for Wireless Networks

    Author : Kasun Hewage; Thiemo Voigt; Shahid Raza; Matthias Hollick; Uppsala universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Datagram Transport Layer Security; Synchronous Transmissions; Denial-of-service Attacks; Transmission Control Protocol; Communication Security; Time Synchronisation; Optical Wireless Communication; Networked Embedded Systems; Internet of Things; Electrical Engineering with Specialisation in Networked Embedded Systems; Elektroteknik med inriktning mot nätverksbaserade inbyggda system;

    Abstract : The vision behind the Internet of Things (IoT) revolves around creating a connected ecosystem where devices, people, and systems collaborate seamlessly, unlocking new possibilities, improving efficiency, and enhancing our daily lives. IoT encloses many device classes, including low-power wireless devices that rely on batteries or energy harvesting. READ MORE

  5. 5. Protocol, mobility and adversary models for the verification of security

    Author : Volkan Cambazoglu; Christian Rohner; Björn Victor; Sonja Buchegger; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Datavetenskap med inriktning mot datorkommunikation; Computer Science with specialization in Computer Communication;

    Abstract : The increasing heterogeneity of communicating devices, ranging from resource constrained battery driven sensor nodes to multi-core processor computers, challenges protocol design. We examine security and privacy protocols with respect to exterior factors such as users, adversaries, and computing and communication resources; and also interior factors such as the operations, the interactions and the parameters of a protocol. READ MORE