Now showing items 79718-79737 of 100943

    • Security Analysis of Future Internet Architectures 

      Ballester Lafuente, Carlos (Master thesis, 2010)
      During the last decades, Internet has evolved from host-centric toinformation-centric in the sense that it is information and data what matters,regardless of where it is located. Meanwhile, Internet's architecturestill ...
    • Security Analysis of TETRA 

      Duan, Shuwen (Master thesis, 2013)
      TETRA is designed to be used in private mobile radio environment, and PMR users have a requirement for high level of security. Security takes a number of different forms, both in terms of availability, reliability of the ...
    • Security Analysis of the Mobile Applications Used in the Pacemaker Ecosystem 

      Bolkan, Helene Sjøgren; Tran, Jeanette Hue Nhu (Master thesis, 2023)
      Vår økende tilkobling på internett har ført til en teknologiavhengighet, som øker raskere enn vi er i stand til å sikre den. Dette medfører betydelige risikoer for personer som bruker disse enhetene. Pacemaker-industrien ...
    • Security Analysis of the Mobile Applications Used in the Pacemaker Ecosystem 

      Bolkan, Helene Sjøgren; Tran, Jeanette Hue Nhu (Master thesis, 2023)
      Vår økende tilkobling på internett har ført til en teknologiavhengighet, som øker raskere enn vi er i stand til å sikre den. Dette medfører betydelige risikoer for personer som bruker disse enhetene. Pacemaker-industrien ...
    • Security Analysis of the Norwegian Toll Road System AutoPASS 

      Bergendahl, Mari (Master thesis, 2018)
      Electronic Fee Collection (EFC) systems are used overall to describe ICT solutions that automatically collects road user charges without the need of stopping. EFC systems consists of two main units; the on board unit (OBU) ...
    • Security Analysis of the NTRUEncrypt Public Key Encryption Scheme 

      Sakshaug, Halvor (Master thesis, 2007)
      The public key cryptosystem NTRUEncrypt is analyzed with a main focus on lattice based attacks. We give a brief overview of NTRUEncrypt and the padding scheme NAEP. We propose NTRU-KEM, a key encapsulation method using ...
    • Security Analysis of the Pacemaker Home Monitoring Unit: A BlackBox Approach 

      Bour, Guillaume Nicolas (Master thesis, 2019)
      With the fast rise of Internet of Things (IoT), electronics systems are more and more connected, exposing new attack surfaces on devices responsible for human life, such as automobiles or medical devices. While companies ...
    • Security Analysis of the Terrestrial Trunked Radio (TETRA) Authentication Protocol 

      Duan, Shuwen; Mjølsnes, Stig Frode; Tsay, Joe-Kai (Journal article; Peer reviewed, 2013)
      We present a security analysis of the widely-deployed Terrestrial Trunked Radio (TETRA) authentication protocol, where we find that the TETRA authentication protocol suffers from flaws that allow an attacker to defeat basic ...
    • Security Analysis of Wireless BAN in e-Health 

      Muka, Romina; Yildirim Yayilgan, Sule; Sevrani, Kozeta (Journal article; Peer reviewed, 2017)
      The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, ...
    • Security Analysis of Wireless Home Monitoring Units in the Pacemaker Ecosystem 

      Lie, Anniken Wium (Master thesis, 2019)
      An increasing number of medical devices are being connected to the Internet, thereby broadening their attack surface. Some people’s lives depend on these devices, hence it is of vital importance that they are secure. A ...
    • Security and Independence of Process Safety and Control Systems in the Petroleum Industry 

      Onshus, Tor Engebret; Bodsberg, Lars; Hauge, Stein; JAATUN, Martin Gilje; Lundteigen, Mary Ann; Myklebust, Thor; Ottermo, Maria Vatshaug; Petersen, Stig; Wille, Egil (Peer reviewed; Journal article, 2022)
      The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry. A general ...
    • Security and Key Establishment in IEEE 802.15.4 

      Klevstad, Eirik (Master thesis, 2016)
      IPv6 over Low power Wireless Personal Area Network (6LoWPAN) is a concept that enables an Internet Protocol (IP) connection over networks that use the Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 ...
    • Security and Measurement Stability in the Climbing Mont Blanc Online Judge 

      Pedersen, Ole Kristian Eidem (Master thesis, 2019)
      Energy consumption is increasing alongside the need for performance for super-computers and small, mobile computing devices alike. In order to increase energyefficency and performance, energy-constrained platforms are ...
    • Security And Performance Of XML Web Services For Mobile Devices 

      Nguyen, Thao Thanh Thi (Master thesis, 2007)
      As more and more sensitive information is entering web based applications, and thus are available through XML Web Services, the security of these systems is of increasing importance. A mobile client that uses a service ...
    • Security and Privacy Challenges in Blockchain Interoperability - A Multivocal Literature Review 

      Haugum, Terje; Hoff, Bjørnar; Li, Jingyue; Alsadi, Mohammed L. K. (Chapter, 2022)
      Transferring data and value across different blockchains is one of the biggest obstacles to further expansion. Blockchain interoperability allows different networks to communicate and transfer data between them and are ...
    • Security and Privacy in RFID Applications 

      Haver, Torstein (Master thesis, 2006)
      Radio Frequency Identification (RFID) is a very versatile technology. It has the potential to increase the efficiency of many common applications and is thus becoming increasingly popular. The main drawback is that the ...
    • Security and Privacy in RFID Applications 

      Haver, Torstein (Master thesis, 2006)
      Radio Frequency Identification (RFID) is a very versatile technology. It has the potential to increase the efficiency of many common applications and is thus becoming increasingly popular. The main drawback is that the ...
    • Security and Privacy issues in IoT based Smart Grids: A case study in a digital substation 

      Abraham, Doney; Yildirim Yayilgan, Sule; Abomhara, Mohamed; Gebremedhin, Alemayehu; Dalipi, Fisnik (Chapter, 2022)
      Smart Grid is one of the increasingly used critical infrastructures that is essential for the functioning of a country. This coupled with Internet of Things (IoT) has huge potentials in several areas such as remote monitoring ...
    • Security and usability assessment of several authentication technologies 

      Sollie, Roar S. (Master thesis, 2005)
      NORSK: I dagens samfunn har det blitt slik at man har endel krav til teknologien. Man ønsker å ha muligheten til å aksessere og utføre oppgaver og tjenester uavhengige av tid og sted. Problemene som da bringes frem er ...
    • Security and usability of SSO and inter-app navigation on iOS and Android 

      Kristiansen, Erling Moxnes; Torgersen, Truls Matias; Vucic, Toni (Bachelor thesis, 2019)
      Målet for denne oppgaven er å utforske om flere små apper er like brukbare og sikre som én stor app. For å finne ut av dette utviklet vi et kryss-plattform \acrfull{sso} bibliotek som tilbyr en sikker og usynlig \acrshort{sso} ...