Now showing items 41-60 of 112

    • FPGA realization of a public key block cipher 

      Fjellskaalnes, Stig (Master thesis, 2009)
      This report will cover the physical realization of a public key algorithm based on multivariate quadratic quasigroups. The intension is that this implementation will use real keys and data. Efforts are also taken in order ...
    • From Lattice Crypto to Lættis Krypto: Various Approaches to Post-Quantum Key Exchange 

      de Kock, Bastiaan Borgert (Doctoral theses at NTNU;2023:201, Doctoral thesis, 2023)
      Key exchange is a cryptographic mechanism: it enables two or more parties to agree upon a shared key that is known only to them, even in the presence of an adversary that has access to all communication between the parties. ...
    • Gait Mimicking: Attack Resistance Testing of Gait Authentication Systems 

      Mjaaland, Bendik Bjørklid (Master thesis, 2009)
      Biometric technology is rapidly evolving in today's society. A large part of the technology has its roots hundreds, or even thousands of years back in time, while other parts are new and futuristic. Research suggest that ...
    • GDPR Compliance for Blockchain Applications in Healthcare 

      Hasselgren, Anton; Wan, Paul Kengfai; Horn, Margareth; Kralevska, Katina; Gligoroski, Danilo; Faxvaag, Arild (Chapter, 2020)
      The transparent and decentralized characteristics associated with blockchain can be both appealing and problematic when applied to a healthcare use-case. As health data is highly sensitive, it is therefore, highly regulated ...
    • GDPR Compliant Blockchain and Distributed Ledger Technologies in the Health Sector 

      Hasselgren, Anton; Kralevska, Katina; Gligoroski, Danilo; Faxvaag, Arild (Peer reviewed; Journal article, 2020)
    • Hadoop, and Its Mechanisms for Reliable Storage 

      Midthaug, Ingvild Hovdelien (Master thesis, 2018)
      Nowadays the global amount of digital data increases rapidly. Internet-connected devices generate massive amounts of data through various interactions such as digital communication and file sharing. In a world surrounded ...
    • Handle Firewall Security Policy by Graphical Traffic Matrix: Grouping of Firewall Rules 

      Kaspersen, Arne Yngve (Master thesis, 2007)
      Organizations today are in trust of the diversity the Internet gives. With a connection they re able to do end-to-end communication with customers and partners everywhere in the world, and because the diversity of Internet, ...
    • HashTag Erasure Codes: From Theory to Practice 

      Kralevska, Katina; Gligoroski, Danilo; Jensen, Rune Erlend; Øverby, Harald (Journal article; Peer reviewed, 2018)
      Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. ...
    • Hyperledger Fabric Platform for Healthcare Trust Relations - Proof of Concept 

      Nedaković, Aleksandar; Hasselgren, Anton Karl Oskar; Kralevska, Katina; Gligoroski, Danilo (Peer reviewed; Journal article, 2023)
      In recent years, blockchain technologies have expanded from the finance field to other areas that rely on trust-based solutions. The healthcare industry represents one such area, as digital transformation disrupts relationships ...
    • Intelligent Scheduled Backup Using Duplicity 

      Matland, Håkon Nymo (Master thesis, 2015)
      Digital information has rapidly become an important part of everyday human life. Consequently, backup solutions are important to ensure digital property is safely stored and protected. This thesis will do an in-depth study ...
    • Java Implementation and Performance Analysis of 14 SHA-3 Hash Functions on a Constrained Device 

      Knutsen, Mats; Martinsen, Kim-André (Master thesis, 2010)
      Several of the widely used cryptographic hash functions in use today are under attack. With the need to maintain a certain level of security, NIST is in the process of selecting new cryptographic hash function(s). Through ...
    • Linearity Measures for Multivariate Public Key Cryptography 

      Samardjiska, Simona; Gligoroski, Danilo (Chapter, 2014)
      We propose a new general framework for the security of Multivariate Quadratic (MQ) public key schemes with respect to attacks that exploit the existence of linear subspaces. We adopt linearity measures that have been used ...
    • Malware Analysis; Frameworks and Tools for Automated Dynamic Analysis of Malware 

      Eriksson, Thomas (Master thesis, 2009)
      This thesis describes different automated dynamic malware analysis solutions and their underlying technologies. A good deal of prerequisite concepts has to be covered before the actual solutions are studied. Some of these ...
    • Malware Detection Through Call Graphs 

      Kinable, Joris (Master thesis, 2010)
      Each day, anti-virus companies receive large quantities of potentially harmful executables. Many of the malicious samples among these executables are variations of earlier encountered malware, created by their authors to ...
    • Medical students' perceptions of a blockchain-based decentralized work history and credentials portfolio: Qualitative feasibility study 

      Hasselgren, Anton; Kralevska, Katina; Gligoroski, Danilo; Faxvaag, Arild (Peer reviewed; Journal article, 2021)
      Background: Increased digitization of health care might challenge some of the trust functions that are established in a traditional health care system. We have, with the concept of VerifyMed, developed a decentralized ...
    • Micro - GAGE: A Low-power Compact GAGE Hash Function Processor for IoT Applications 

      El-Hadedy, Mohamed; Margala, Martin; Mosanu, Sergiu; Gligoroski, Danilo; Xiong, Jinjun; Hwu, Wne-Mei (Chapter, 2020)
      The emergence of Internet of Things (IoT) applications presents a wide range of opportunities in areas such as automotive, consumer, energy, smart city and many others. Since many of these systems operate in environments ...
    • Multibiometric Systems 

      Dhamala, Pushpa (Master thesis, 2012)
      Multibiometric Systems
    • Network Slicing in Beyond 5G: Implementation, Isolation, and Coexistence 

      Esmaeily, Ali (Doctoral theses at NTNU;2023:407, Doctoral thesis, 2023)
      The contemporary landscape of telecommunications is defined by the advent of Fifth Generation (5G) and the tantalizing promise of Beyond 5G (B5G) networks. 5G and B5G networks are the keys to fulfilling a massive number ...
    • Network Traffic Driven Storage Repair 

      Gligoroski, Danilo; Kralevska, Katina; Jensen, Rune Erlend; Simonsen, Per (Journal article; Peer reviewed, 2019)
      Recently we constructed an explicit family of locally repairable and locally regenerating codes. Their existence was proven by Kamath et al. but no explicit construction was given. Our design is based on HashTag codes that ...
    • New trends in Internet attacks: Clickjacking in detail 

      Thoresen, Torgeir Dahlqvist (Master thesis, 2009)
      While the complexity of web applications and their functionality continually increase, so do the number of opportunities for an attacker to launch successful attacks against a web application's users. In this thesis we ...