Sök:

Sökresultat:

564 Uppsatser om Secure Neighbor Discovery - Sida 1 av 38

Säker grannupptäck i IPv6

The IPv6 protocol offers with some new functions, one of them is auto configuration. With auto configuration it is possible for nodes, i.e. hosts and routers, for automatically associated with IPv6 addresses without manual configuration. Auto configuration it is another protocol as it uses Neighbor Discovery protocol (ND) messages (ND is mandatory in the IPv6 stack). The main purpose of ND is that nodes can discover other nodes on the local link, perform address resolution, check that addresses are unique, and check the reachability with active nodes.There are exactly the same vulnerabilities of IPv6 as IPv4 and is now exception, ND if not properly secured.

Förmedling av discovery-verktyg vid högskole- och universitetsbibliotek ? En enkätstudie om undervisande bibliotekariers inställningar till discovery-verktyg och hur de förmedlar dessa vid referenssamtal och användarundervisning

The purpose of this thesis is to examine how Swedish highereducation librarians mediate discovery tools to its users. Thisstudy aims to investigate higher education librarians? generalattitudes towards discovery tools, their perception ofstudents? discovery tool usage, and how they mediatediscovery tools to students through reference interviews anduser training. The empirical ground of this study is a semistructuredsurvey that was answered by 115 instructinglibrarians. The study concludes that although librariansgenerally have a critical attitude towards discovery tools theyalso think that the discovery tools serve a useful purpose,especially as a starting point in the information searchprocess.

IPv6 - Gatewayredundans : Snabbt nog?

IPv6 har, till skillnad från tidigare versioner av protokollet, inbyggt stöd för redundans hos gatewayenheter. Vid nyttjande av ett flertal gatewayenheter kan det, med hjälp av Neighbor Unreachability Detection, ske automatisk övergång till en ny gatewayenhet utifall att den aktiva skulle gå ur funktion. Innan IPv6 har man varit tvungen att förlita sig på externa lösningar för att uppnå denna redundans. Den huvudsakliga fråga som ställs i rapporten är om det inbyggda stödet för gatewayredundans i IPv6 är tillräckligt snabbt för att kunna nyttjas självständigt, utan att förlita sig på externa lösningar. För att kunna ta fram ett värde om vad som var ?tillräckligt snabbt? har vi, genom att läsa tidigare forskning om användares upplevelse av fördröjningar, kommit fram till att en fördröjning ej får överstiga tio sekunder.

Cross-Border Listings and Price Discovery: Evidence from UK- and US-listed Swedish Stocks

Objective: The objective of this study is to examine the extent to which the London stock exchange and the US stock exchange Nasdaq respectively contributes to the price discovery of Swedish stocks listed on the Stockholm stock exchange, the London stock exchange and the US stock exchange Nasdaq.Method: The study is a replicate study of the studies by Grammig, Melvin and Schlag (2000) and Eun and Sabherwal (2003). The methodology is based on the methodology of the latter study. The data material consisting of quoted stock prices for three Swedish stocks on the three stock exchanges at five-minute intervals during a 49-day-period in 2003 has been run through different statistical tests in a five-step process.Conclusion: The evidence of this study shows that prices on SSE, LSE and NASD are cointegrated and mutually adjusting. The evidence suggests that in all three cases, price discovery takes place on the home stock exchange SSE. Moreover, LSE contributes more to price discovery than Nasdaq.

Politecast : ett nytt kommunikationsprimitiv för trådlösa sensornätverk

Wireless sensor networks have the potential for becoming a huge market. Ericsson predicts 50 billion devices interconnected to the Internet by the year 2020. Before that, the devices must be made to be able to withstand years of usage without having to change power source as that would be too costly. These devices are typically small, inexpensive and severally resource constrained. Communication is mainly wireless, and the wireless transceiver on the node is typically the most power hungry component.

Övergången till IPv6: Säkerhetsrisker

Den 21 januari 2011 delades de sista tillgängliga blocken av IPv4-adresser ut. Detta gör att dess efterträdare IPv6 är aktuellare än någonsin, då det snart inte finns några adresser kvar. IPv6 för med sig mer inbyggd säkerhet, men också nya säkerhetsrisker. Detta arbete undersöker vilka säkerhetsrisker gällande tillgänglighet som finns vid en övergång från IPv4 till IPv6 och vilken medvetenhet systemadministratörer har om dessa. Resultaten tyder på att det finns en mängd olika säkerhetsrisker vid övergången till IPv6.

Säkra kommunikationskanaler i en distribuerad heterogen miljö

The systems environments of today are often distributed and heterogeneous. These kind of systems have several advantages but also disadvantages. One problem is how to keep them secure.The security problems in these environments are mainly due to the communication between the connected computers. It is relatively easy to tap these communication channels from information. There is also a need for the possibility to secure these channels from modification of sent information and to be able to verify the sender and receiver of information in a secure manner.

Effekten av discoverytjänster på bibliotekens e-resurser? ? En undersökning om Summons effekt på Chalmers bibliotek.

The purpose of this essay is to examine what happens with library e-resources after implementing the discovery tool Summon. Summon provides a Google-like experience and uses multiple facet options when users need to narrow their discovery. Observations of change in the libraries e-resources with regards to database searches, click-throughs in linkresolvers and full text downloads are examined through looking at earlier reports and statistics from libraries in America and England. This provides a way to compare with Chalmers University of Technology?s Library.

"Lite udda och inte riktigt som andra" : en tematisk undersökning av hur utanförskap och identitetssökande som motiv skildras i Inger Edelfeldts romaner

The main purpose of this study is to analyse how the main themes of alienation and the search for identity is portrayed by Swedish author Inger Edelfeldt. I have applied the theories of Rita Felski concerning feminist novels of self-discovery, in which the development of the female identity is the main question. As Edelfeldt?s writing consists of literature for the young as well as adults, I have included material from both of these genres. I have also taken use of Ulla Lundqvists theories about Swedish juvenile books when examining aspects of the main character?s feelings of alienation and identity searching.The results of my analysis show that the reading of my material as feminist novels of self-discovery has revealed pervading charachteristics of alienation, love, friendship and psychological development.

A targeted evaluation of OpenEye?s methods for virtual ligand screens and docking

The process of drug discovery is very slow and expensive. There is a need for reliable in silico methods; however the performance of these methods differs.This work presents a targeted study on how the drug discovery methods used in OpenEye?s tools ROCS, EON and FRED perform on targets with small ligands. It was examined if 12 compounds (markers) somewhat similar to AMP could be detected by ROCS in a random data set comprised of 1000 compounds. It was also examined if EON could find any electrostatic similarities between the queries and the markers.

Säkerhetsstandard för ett mjukvarubaserat säkerhetselement

Researchers today anticipate that in the near future, the majority of the owners of a smartphone will use it as a wallet, i.e. for contactless payment. The technology that enables contactless payment today is ?Near Field Communication? (NFC), which is increasingly embedded in smartphones. Applications like mobile payment between a phone and a terminal use NFC.

Skapande Skola : Diskursen, praktiken och kulturaktörens betydelse

In this paper the discourseand social practice of the Swedish culture funding system Skapande Skola hasbeen mapped out and examined. The material for analysis was takenfrom regulating documents, information texts and media texts, and alsofrom four interviews that were conducted. The theoretical foundation is builton theories from Pierre Bourdieu, Michel Foucault and the theoretical frameworkof New Public Management. The survey has resulted in three major points ofinterest. They are presented throughout the text.

?Nej, men jag söker väl tills jag hittar?: En studie av discoveryverktyget Summon utifrån ett användarperspektiv.

The purpose of this bachelor?s thesis is to examine how students at Högskolan i Borås experience the web-scale discovery service Summon, based on the theoretical model of ?The Five Dimensions of Usability?, defined by Whitney Quesenbery. The study aims to answer the following research questions: How do the students execute search assignments in the Summon interface? How intuitive and easy to navigate is the system from a user perspective? What are the students? opinions about Summon, regarding usability?Five students with varying information seeking skills are asked to perform search assignments during controlled observation, followed by semi-structured interviews. Our findings are presented in the context of previous research and show correspondence with the results of related studies.

Säkerhet i Wireless Local Area Networks : En studie i säkerhetslösningar utförd på uppdrag av Saab Bofors Dynamics AB.

Saab Bofors Dynamics AB is looking for ways to let the employees work wireless in the future. The security in Wireless Local Area Networks (WLAN) has not been considered very reliable, but new standards and protocols have been developed to enhance the security in WLAN. Since most wireless components soon will have built in support for wireless communication, it is important to have a model to deal with secure wireless communication ready. This is necessary because it is important to protect the company?s information related systems, ensure contingency in the daily work and maintaining the trust of the market and the authorities.

Vänskapshot : - en följd av ett långvarigt samarbete mellan en revisor och ett litet ägarlett bolag?

This is a bachelor essay in business and administration with concentration in accounting. The purpose of the essay is to describe and analyse how an auditor, who has had a close cooperation with a small owner-led company in several years, can obstruct the specific familiarity-threat and if it appears, secure that it does not affect the independence of the auditor.The conclusion of this essay contains two models which intend to describe how an auditor, as a suggestion, can obstruct the specific friendship-threat and if it appears secure the independence of the auditor..

1 Nästa sida ->