Now showing items 61-80 of 97

    • MAC layer security services in IEEE 802.15.4 

      Solheim, Sindre Elias (Master thesis, 2018)
      The Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 standard describes the Medium Access Control (MAC) sub-layer and Physical layer of the Open Systems Interconnection (OSI) model of low-rate wireless ...
    • Mobile Network Security Experiments With USRP 

      Mruz, Andre (Master thesis, 2016)
      Though the mobile phone market has embraced 3G and 4G services, especially for the convenience of high speed Internet connectivity, the original cellular network system, GSM, is still available and covers most of the human ...
    • National Authentication Systems 

      Sandnes, Are Haugen (Master thesis, 2012)
      Information security has to adapt to an ever-changing environment. Recently there has been a significant increase in the use of smartphones and other mobile devices to access services on the Internet that originally is ...
    • The NISK 2021 Proceedings Message from the Programme Chairs 

      Mjølsnes, Stig Frode; Costache, Anamaria (Journal article; Peer reviewed, 2021)
    • Om implementering av frekvenshopping i OpenBTS. 

      Bremseth, Morten (Master thesis, 2011)
      Denne Rapporten gir en forklaring på hva programvaredefinert radio er generelt. Den omtaler en konkret realisering ved hjelp av programvaren GNU Radio og den universale radioenheten USRP (Universal Software Radio Peripheral). ...
    • On Low-Cost Privacy Exposure Attacks in LTE Mobile Communication 

      Olimid, Ruxandra-Florentina; Mjølsnes, Stig Frode (Journal article; Peer reviewed, 2017)
      Abstract The security of mobile communication is of great interest nowadays because of the wide spread and extensive use of mobile communication worldwide. Although LTE has been designed to provide better security than ...
    • OpenID Connect 

      Bjune, Arne Dahl (Master thesis, 2014)
      This thesis investigates whether OpenID Connect can replace SAML. In addition it provides an understanding of three types of Single Sing-on solutions, namely; SAML, OAuth and OpenID Connect. In order to accomplish this ...
    • Preface 

      Mjølsnes, Stig Frode (Lecture Notes in Computer Science;, Chapter; Conference object; Peer reviewed, 2015)
      Hackers, in the wide positive sense, are often enthusiastic presenters of their practical experience and exploits, but quite indifferent to writing papers. By contrast, scientists are good at writing papers, but often ...
    • Privacy Analysis of Next Generation Emergency Communication Network Devices in Norway 

      Varhaugvik, Sigurd (Master thesis, 2022)
      Beredskapstjenester som ambulanse, brannmenn og politi er avgjørende for å opprettholde et trygt og sikkert samfunn. Samarbeid er essensielt for arbeidet og krever et pålitelig trådløst kommunikasjonsnettverk. Terrestrial ...
    • Privacy Leakage in Fitness Equipment Communication 

      Svenskerud, Benedicte Væting (Master thesis, 2018)
      The technology is constantly evolving with use of personal data as a central component of new applications and services. At the same time, physical activity has become an important part of the modern society. This has led ...
    • Private Identification of Subscribers in Mobile Networks: Status and Challenges 

      Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2019)
      The privacy of individuals in the context of mobile networks is crucial nowadays. Nevertheless, too few improvements have been made over the years to secure the privacy of subscribers. As a consequence, current generations ...
    • Private Identification Schemes for 5G IoT Networks 

      Gabrielsen, Kenneth (Master thesis, 2021)
      Oppgaven tar utgangspunkt i problemet med privat identifisering for Internet of Things (IoT) enheter når de skal brukes i det nye 5G mobilnettet. Løsningen i 5G for å holde identifiserbar informasjon hemmelig benytter seg ...
    • Pseudonymiseringsteknologi i nasjonale helseregistre 

      Gevelt, Tine (Master thesis, 2007)
      I Norge, finnes det i dag en rekke helseregistre. Blant disse er det per i dag bare to pseudonyme helseregistre. Det vil si registre som ikke er avidentifiserte, anonyme eller personidentifiserende. De er personentydige. ...
    • Public Key Cryptography for 5G Private Identification 

      Halland, Julie Fylkesnes (Master thesis, 2020)
      Den neste generasjonen mobilnett blir kalt 5G. 5G introduserer flere forbedringer i forhold til den forrige generasjonen, kjent som Long Term Evolution (LTE). Noen av disse forbedringene gjelder personvernet til abonnentene. ...
    • Realizing Distributed RSA using Secure Multiparty Computations 

      Mauland, Atle (Master thesis, 2009)
      This thesis describes the basic theory of multiparty computation (MPC) in addition to a fully functional distributed Rivest-Shamir-Adleman (RSA) protocol for three players implemented in Virtual Ideal Functionality Framework ...
    • Realizing Secure Multiparty Computations 

      Vegge, Håvard (Master thesis, 2009)
      In this thesis the Virtual Ideal Functionality Framework (VIFF) has been used for implementing practical applications based on multiparty computation (MPC). The work started with a theoretical study of secret sharing and ...
    • Robustness in Wireless Network Access Protocols 

      Eian, Martin (Doctoral Theses at NTNU, 1503-8181; 2012:230, Doctoral thesis, 2012)
      Wireless network access protocols are used in numerous safety critical applications. Network availability is essential for safety critical applications,since loss of availability can cause personal or material damage. An ...
    • Secure and Verifiable Electronic Elections at NTNU 

      Onshus, Bent Kristoffer Rosvold (Master thesis, 2006)
      This thesis describes an electronic voting system based on Damg\aa rd, Jurik and Nielsen's generalization of Paillier's probabilistic public key system. A threshold variant of this homomorphic cryptosystem is used to provide ...
    • Secure and Verifiable Electronic Elections at NTNU 

      Onshus, Bent Kristoffer Rosvold (Master thesis, 2006)
      This thesis describes an electronic voting system based on Damgaa rd, Jurik and Nielsen's generalization of Paillier's probabilistic public key system. A threshold variant of this homomorphic cryptosystem is used to provide ...
    • Secure E-Passport Access Methods 

      Karanjit, Prajwalan (Master thesis, 2009)
      The main goal of upgrading passports to an electronic version is making it hard for criminals or anybody to counterfeit or illegally duplicate them. A practical way of doing so is through the use of digital signatures ...