Now showing items 21-40 of 40

    • OWASP Top 10 - Do Startups Care? 

      Søhoel, Halldis M; Jaatun, Martin Gilje; Boyd, Colin Alexander (Chapter, 2018)
      In a cut-throat world where time-to-market can be the difference between success and failure, it can be tempting for startups to think “let’s get it to work first, and then we’ll worry about security later.” However, major ...
    • OWASP top ten - What is the state of practice among start-ups? 

      Søhoel, Halldis Margrete (Master thesis, 2018)
      New apps and web services are increasingly serving our everyday needs, and they are appearing at high speed. How secure are all these services? This thesis has tested the security of five web services developed by startups. ...
    • Proof-of-Stake for Consensus in Cryptocurrencies 

      Buøen, Marie Gotaas (Master thesis, 2018)
      Blockchain technology and cryptocurrencies, with Bitcoin and Etherum leading the field, has gained a much attention in recent years. Not only because of their highly volatile prices, which makes them a perfect trading ...
    • Relay attacks of NFC smart cards 

      Chu, Xiqing (Master thesis, 2014)
      Near Field Communication (NFC) is a set of standards, which allows two devices to transfer messages over a short range of distance of 10 cm. NFC based smart cards and applications are widely used for public transportation, ...
    • Risk Compensation in Information Security 

      Mæhlum, Hanne Riise (Master thesis, 2014)
      This thesis looks into the concept of risk compensation in information security. An understanding of risk compensation theory is provided along with an analysis of what elements to consider when looking at risk compensation ...
    • Secure channels and termination: The last word on TLS 

      Boyd, Colin Alexander; Hale, Britta (Peer reviewed; Journal article, 2019)
      Secure channels are one of the most pivotal building blocks of cryptography today. Internet connections, secure messaging, protected IoT data, etc., all rely upon the security of the underlying channel. In this work we ...
    • Secure data sharing in the cloud 

      Gran, Eivind Nordal (Master thesis, 2019)
      Sikkerhet innen skydeling er et viktig tema i verden i dag. Sikker- hetssystemet i de vanligste løsningene for skydeling krever at brukeren stoler på leverandøren av skytjenesten for å beskytte den opplastede dataen. En ...
    • Secure Termination in Real-World Security Protocols 

      Toreskås, Jonas Lunde (Master thesis, 2016)
      As the Internet was initially invented without any security concerns, a way of secure communication over an untrusted network was nowhere to be found. After years of research, the TLS protocol became this Internet standard ...
    • Security analysis of Docker containers in a production environment 

      Kabbe, Jon-Anders (Master thesis, 2017)
      Container technology for hosting applications on the web is gaining traction as the preferred mode of deployment. Major actors in the IT industry are transforming their infrastructure into smaller services and are using ...
    • Security and Key Establishment in IEEE 802.15.4 

      Klevstad, Eirik (Master thesis, 2016)
      IPv6 over Low power Wireless Personal Area Network (6LoWPAN) is a concept that enables an Internet Protocol (IP) connection over networks that use the Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 ...
    • Security notions for cloud storage and deduplication 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen (Journal article; Peer reviewed, 2018)
      Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, yet it is not obvious what security properties are required ...
    • Security of Domestic Products in the IoT 

      Chiem, Henriette Victoria (Master thesis, 2015)
      In the last few years, the idea of connecting existing computing devices through wireless communication has given place to the concept of the Internet of Things (IoT). Many products are already available for the domestic ...
    • Security of Internet of Things Protocol Stacks 

      Andersen, Øystein Løvdal (Master thesis, 2016)
      Internet of Things has become one of the big buzzwords in the IT market in recent years, and it is predicted to continue its rapid growth in the coming years. In order to talk about the Internet of Things, this thesis ...
    • Security of Microsoft OneDrive 

      Lonsky, Rafael (Master thesis, 2018)
      Cloud storage allows users to access and manage their data from any place in the world. One of the biggest cloud storage providers is Microsoft with its product OneDrive, which serves millions of users around the globe. ...
    • Side channels in deduplication: trade-offs between leakage and efficiency 

      Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen (Chapter, 2017)
      Deduplication removes redundant copies of files or data blocks stored on the cloud. Clientside deduplication, where the client only uploads the file upon the request of the server, provides major storage and bandwidth ...
    • Simulating secure cloud storage schemes 

      de la Mata, Jorge Campos (Master thesis, 2017)
      Cloud storage services have become a popular solution to store large amounts of data generated by users and enterprises, because they provide an affordable and practical solution. In order to gain efficiency and reduce ...
    • Towards protected VNFs for multi-operator service delivery 

      Boyd, Colin Alexander; Biczok, Gergely; Marku, Enio (Chapter, 2019)
      Value-added 5G verticals are foreseen to be delivered as a service chain over multiple network operators with extensive outsourcing of Virtual Network Functions (VNFs). In this short paper we introduce the initial design ...
    • Trust Management for a Smart Card Based Private eID Manager 

      Chen, Shi (Master thesis, 2016)
      Humans are smart when facing solely technical attacks; they invented technical strategies to defend against technical attacks. However, when facing a social engineering attack, a socio-technical attack, humans become the ...
    • Trust Management in Fog Computing 

      Dybedokken, Tuva Selstad (Master thesis, 2017)
      With the rise of fog computing, computation is moved away from a purely centralized approach. In the centralized approach devices have direct contact with the cloud servers. In fog computing allows for processing data along ...
    • Valuable Puzzles for Proofs-of-Work 

      Boyd, Colin Alexander; Carr, Christopher (Journal article; Peer reviewed, 2018)
      Proof-of-work (PoW) is used as the consensus mechanism in most cryptocurrencies. PoW-based puzzles play an important part in the operation and security of a cryptocurrency, but come at a considerable energy cost. One ...