• Securing Near Field Communication 

      Kortvedt, Henning Siitonen (Master thesis, 2009)
      Near Field Communication (NFC) specifies a standard for a wireless communication protocol enabling data transfer by keeping two devices close together, about 10 cm maximum. NFC is designed for integration with mobile phones, ...
    • Securing Next Generation Multinodal Leadless Cardiac Pacemaker System: A Proof of Concept in a Single Animal 

      Awan, Muhammad Faheem; Cordero, Rafael; Kansanen, Kimmo; Feuerstein, Delphine (Peer reviewed; Journal article, 2020)
      As the next generation of implanted medical devices for cardiac rhythm management moves towards multi-nodal leadless systems that do without the limitations of transvenous leads, new security threats arise from the wireless ...
    • Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions 

      Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander (Peer reviewed; Journal article, 2020)
      It is becoming increasingly common for enterprises to outsource network functions to a third party provider such as a public cloud. Besides its well documented benefits in cost and flexibility, outsourcing also introduces ...
    • Securing Safety in the Norwegian Petroleum Industry with Digital Twins 

      Huus, Iben Andrea Bøyum; Paulsen, Rikke Kjenes (Master thesis, 2022)
      Norsk petroleumindustri er underlagt strenge krav til kontroll og sikkerhet. Dette skyldes at hendelser kan ha konsekvenser som tap av utstyr, miljømessig og økonomisk forringelse og tap av liv. Informasjonsteknologi (IT) ...
    • Securing Safety in the Norwegian Petroleum Industry with Digital Twins 

      Huus, Iben Andrea Bøyum; Paulsen, Rikke kjenes (Master thesis, 2022)
      Norsk petroleumindustri er underlagt strenge krav til kontroll og sikkerhet. Dette skyldes at hendelser kan ha konsekvenser som tap av utstyr, miljømessig og økonomisk forringelse og tap av liv. Informasjons Teknologi ...
    • Securing software systems in the health care domain 

      Kosmo, Monika Katrin (Master thesis, 2014)
      Cloud computing is a continuously emerging technology of which new areas of utilization is adopted. Among these, medical sensor networks are increasingly used for purposes like remote monitoring of the health condition of ...
    • Securing Tactical Service Oriented Architectures 

      Gkioulos, Vasileios (Doctoral theses at NTNU;2018:46, Doctoral thesis, 2017)
      Abstract Research and development across military network technologies is an ongoing task, seeking to satisfy continuously evolving requirements and adversarial models. Beyond distinct implementations or technologies, the ...
    • Securing the boot process of embedded Linux systems 

      Belay, Nahom Aseged (Master thesis, 2022)
      I løpet av de siste årene har antallet tilknyttede enheter som utgjør Internet of Things økt dramatisk, og lite tyder på at denne utviklingen er i ferd med å snu. Ettersom disse enhetene utgjør en vesentlig del av kritiske ...
    • Securing the Distributed Kalman Filter Against Curious Agents 

      Moradi, Ashkan; Dasanadoddi Venkategowda, Naveen Kumar; Talebi, Sayedpouria; Werner, Stefan (Chapter, 2021)
      Distributed filtering techniques have emerged as the dominant and most prolific class of filters used in modern monitoring and surveillance applications, such as smart grids. As these techniques rely on information sharing ...
    • Securing the IaaS Service Model of Cloud Computing Against Compromised Components 

      TaheriMonfared, Aryan (Master thesis, 2011)
      Cloud Computing is a new computing model, and its security aspects require special considerations. New characteristics of the cloud model have introduced new security challenges, and made some of the existing security ...
    • Securing the ICT-based examination 

      Bjørklund, Petter Gysler (Master thesis, 2010)
      ENGELSK: This master project covers security aspects related to conducting ICT-based examination of students. We have investigated security requirements and best practice of conducting examination in a digital environment. ...
    • Securing the Software Development Life Cycle 

      Arildset, Anniken; Brynildsen, Celina Heimdal; Hestsveen, Sebastian; Urne, Thea (Bachelor thesis, 2023)
      Denne rapporten fokuserer på å adressere viktigheten av å sikre systemer og applikasjoner ved å fokusere på implementering av sikkerhetstesting og integrering av verktøy i en utviklingspipeline. Rapporten gir et proof of ...
    • Securing the transition to IPv6 in small/medium sized businesses 

      Dalbakk, Henrik (Master thesis, 2010)
      ENGELSK: The Internet has evolved in a frantic pace the last 15 years, few could anticipate the rapid growth and the enormous impact it has had on global communication. When something evolved this fast it is bound to get ...
    • Securing trust in AI systems through increased explainability: linking Norwegian organizations' challenges in regards to eXplainable Artificial Intelligence (XAI) with a 2021 view on relevant techniques and methods 

      Hannestad, Ole-Jørgen (Master thesis, 2021)
      Denne masteroppgaven tar utgangspunkt i innsikt tilegnet gjennom intervjuer med norske organisasjoner om deres utfordringer innen eXplainable Artificial Intelligence (XAI), originalt presentert i et spesialiseringsprosjekt ...
    • Security Analysis of an RFID-based Fare Collection System 

      Iglesias Galván, Gerardo (Master thesis, 2009)
      Radio frequency identification (RFID) systems aim to identify tags to readers in an open environment where neither visual nor physical contact is needed for communication. Because of their low production costs and small ...
    • Security Analysis of an RFID-based Fare Collection System 

      Galván, Gerardo Iglesias (Master thesis, 2009)
    • Security analysis of Aspiro Music Platform, a digital music streaming service 

      Kachanovskiy, Roman (Master thesis, 2010)
      The report is mainly based on recommendations given by the National Institute of Standards and Technology in special publication 800-30 ``Risk Management Guide for Information Technology Systems''. The risk analysis presented ...
    • Security analysis of blind signatures and group signatures 

      Nordli, Børge (Master thesis, 2007)
      We present the latest formal security definitions for blind signature schemes and for group signature schemes. We start by introducing theory about algorithms, probability distributions, distinguishers, protocol attacks ...
    • Security analysis of Docker containers in a production environment 

      Kabbe, Jon-Anders (Master thesis, 2017)
      Container technology for hosting applications on the web is gaining traction as the preferred mode of deployment. Major actors in the IT industry are transforming their infrastructure into smaller services and are using ...
    • Security Analysis of Electronic Identity Schemes 

      Amdam, Eli Sofie Finnøy (Master thesis, 2009)
      This report is about electronic identity (eID) schemes and a security analysis in the Universal Composable (UC) security framework of Transport Layer Security (TLS) and OpenID. The security analysis show that secure ...