Browsing by Keywords "data protection"
Now showing items 1-10 of 10
-
An embedded platform for developing data protection protocols on smart vehicles.
T.E.I. of Crete, School of Engineering (STEF), Department of Informatics Engineering
Authors:
Thesis advisor:
Publication Date: 2021-05-16In this thesis we present an automotive engineering platform that allows designing and experimenting with security solutions for automotive networks, and more specifically CAN bus. The hardware implementation of the platform ... -
Security primitives in a hierarchical GNU/LINUX driver of a hardware NoC firewall.
T.E.I. of Crete, School of Engineering (STEF), PPS in Informatics and Multimedia
Authors:
Thesis advisor:
Publication Date: 2019-07-24We develop design methodology for implementing and validating hierarchical GNU/Linux security primitives on top of a hardware Network-on-Chip (NoC) Firewall mechanism embedded in an FPGA development board (ARMv7-based ... -
An analysis of infrastructure technologies for large scale systems and services.
T.E.I. of Crete, School of Engineering (STEF), Department of Informatics Engineering
Authors:
Thesis advisor:
Publication Date: 08-07-2013In this thesis, we will consider what Cloud Computing is, the architecture and categorization of services it provides. We will study the impact in organizing and functioning of organizations and new business opportunities ... -
Interrnal threats treatment.
T.E.I. of Crete, School of Engineering (STEF), Department of Informatics Engineering
Authors:
Thesis advisor:
Publication Date: 20-03-2012This paper presents and construed the term of the internal threat and attacks described incidents of internal threat and proposed responses from malicious attacks. Design / methodology / approach - Several studies suggest ... -
Secure message transmission over a wireless peer network.
T.E.I. of Crete, School of Engineering (STEF), Department of Informatics Engineering
Authors:
Thesis advisor:
Publication Date: 04-07-2012The thesis is comprised by two parts and provides clear solutions to a series of matters related to the assurance of personal information. The first stage focuses on implementing an application that is suitable for a mobile ... -
Data protection impact assessment using distributed ledger technology.
H.M.U., School of Engineering (ScENG) MSc in Informatics & Multimedia
Authors:
Thesis advisor:
Publication Date: 2022-12-02The technological progress has advanced the quantity of personal data organizations and companies can globally acquire. A situation that brought to light the inability of Directive 95/46/EC, the legal act concerned the ... -
Risks of e-commerce, and security of personal information.
T.E.I. of Crete, School of Engineering (STEF), Department of Informatics Engineering
Authors:
Thesis advisor:
Publication Date: 29-02-2008The realization of electronic transactions through the internet in many cases is postponed because of security matters. The insecurity and uncertainty of users in relation to performing electronic transactions are probably ... -
Methods of privacy detection on the internet and techniques for protection from malicious users.
T.E.I. of Crete, School of Engineering (STEF), Department of Informatics Engineering
Authors:
Thesis advisor:
Publication Date: 2017-01-17This dissertation is divided in two main chapters. It looks at how personal information can be leaked and stolen without our knowledge and consent, so they could be used from malicious users and it will give suggestions ... -
Protection from identity theft.
T.E.I. of Crete, School of Engineering (STEF), Department of Informatics Engineering
Authors:
Thesis advisor:
Publication Date: 01-03-2011This work refers to identity theft and identity protection, not only in the real world but also, over the Internet. It is important to know that despite the advantages that current technology has to offer, there is also a ... -
Data protection in personal computers.
T.E.I. of Crete, School of Engineering (STEF), Department of Informatics Engineering
Authors:
Thesis advisor:
Publication Date: 01-09-2011The need for security when even using personal computers has gradually increased over the years. The amount of private and sensitive information that are nowadays stored and transferred through personal computers (such as ...