Sökning: "Data Tampering"
Visar resultat 16 - 20 av 20 uppsatser innehållade orden Data Tampering.
16. En studie av metoder för manipuleringsresistens
Kandidat-uppsats, Linköpings universitet/Institutionen för datavetenskapSammanfattning : Tamper-resistance is the implementation of some kind of security against physical attacks on a device. Most tamper-resistance methods are focused on preventing the theft of data or keys from a device, while others are focused on detecting or responding to an attack. LÄS MER
17. Losses in the Electric Grid on Pemba, Tanzania
Kandidat-uppsats, KTH/EnergiteknikSammanfattning : Reliable energy is fundamental for a region’s capacity for sustainable development. The island Pemba, which together with Unguja forms Zanzibar, is a semi-autonomous part of Tanzania. The electric power supply on the island is unreliable and blackouts are frequently occurring. LÄS MER
18. SIP Security Threats and Countermeasures
Magister-uppsats, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)Sammanfattning : With the emergence of multimedia applications and the upcoming age of Voice over IP (VoIP), Voice setup and resources control protocols such as SIP and H.323 over the Internet are becoming increasingly attractive applications. LÄS MER
19. Security for Mobile Payment Transaction
Master-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)Sammanfattning : The advancement of ICT in a variety of sectors helped in improving the time consuming and rigid service into fast and flexible service that is closer to the reach of individuals. For instance, mobile applications have evolved in different sectors such as healthcare patient support, geographic mapping and positioning, banking, e-commerce payment services and others. LÄS MER
20. SToP Tampering of Products in Aviation Industry Design a practical guidline for choosing an appropriate RFID system for anti-counterfeiting in the aviation industry
Magister-uppsats, Högskolan i Borås/Institutionen IngenjörshögskolanSammanfattning : Controlling the authenticity of a product in the supply chain has been a struggle formanufacturers, and increasing complexity of the chains intensifies the imitation andcounterfeiting threats. Indeed, counterfeiting is absent from effective control in supply chainand manufacturers are looking for a technology to supply this control. LÄS MER