Now showing items 81-100 of 112

    • Securing the IaaS Service Model of Cloud Computing Against Compromised Components 

      TaheriMonfared, Aryan (Master thesis, 2011)
      Cloud Computing is a new computing model, and its security aspects require special considerations. New characteristics of the cloud model have introduced new security challenges, and made some of the existing security ...
    • Security Analysis of an RFID-based Fare Collection System 

      Iglesias Galván, Gerardo (Master thesis, 2009)
      Radio frequency identification (RFID) systems aim to identify tags to readers in an open environment where neither visual nor physical contact is needed for communication. Because of their low production costs and small ...
    • Security Analysis of Future Internet Architectures 

      Ballester Lafuente, Carlos (Master thesis, 2010)
      During the last decades, Internet has evolved from host-centric toinformation-centric in the sense that it is information and data what matters,regardless of where it is located. Meanwhile, Internet's architecturestill ...
    • Security as a Service in Cloud for Smartphones 

      subramanian, lakshmi (Master thesis, 2011)
      Smartphone usage has been continuously growing in recent times. Smartphones offer Personal Computer (PC) functionality to the end user, hence they are vulnerable to the same sorts of security threats as desktop computers. ...
    • Security in Offline Web Applications 

      Svartberg, Anja (Master thesis, 2009)
      Offline Web applications are increasingly popular. The possibility to have both the advantages of Web applications and traditional desktop applications is exiting. An offline Web application can be accessed from all ...
    • Security in SOA-Based Healthcare Systems 

      Sassoon, Richard (Master thesis, 2009)
      Healthcare organizations need to handle many kinds of information and integrate different support systems, which may be accessed from external corporations. Service Oriented Architecture (SOA) provides the means to achieve ...
    • Security issues in eyeOS 

      Obadya, Samaneh (Master thesis, 2012)
      Cloud computing nowadays, is a hot topic in Information Technology. Itbrings about the fundamental paradigm shift in IT systems realm. Cloudcomputing claims and aims to bring along improvements to the IT services.Improved ...
    • Security Issues in OpenStack 

      Slipetskyy, Rostyslav (Master thesis, 2011)
      Security Issues in OpenStack
    • Security Issues with Content Management Systems (CMSs) on the Cloud 

      Østdahl, Thomas (Master thesis, 2011)
      Although cloud computing is the major hype nowadays, it is actually a relatively old concept which can be dated back to the 1950s. Then, AT&T was developing a centralized infrastructure and storage space, where their ...
    • Security of QR Codes 

      Kapsalis, Ioannis (Master thesis, 2013)
      The 2-dimensional barcodes known as QR (Quick Response) Codesare increasing their popularity as they appear in more places in theurban environment. QR Codes can be considered as physical hyper-linksthat give the ability ...
    • Security Testing of the Pacemaker Ecosystem 

      Kristiansen, Eivind Skjelmo; Wilhelmsen, Anders Been (Master thesis, 2018)
      In later years there has been an increased attention regarding the cyber-security in `smart' devices. With the rise of the Internet of Things it is becoming popular to connect every `smart' device to the internet, including ...
    • Self-Healing after Security Incidents 

      Nilsson, Ingvild Løes (Master thesis, 2020)
      Ettersom tjenester blir stadig mer digitalisert, ekspanderer også angrepsflaten til digitale forbrytere. Moderne systemer har nådd et nivå av kompleksitet som er vanskelig å vedlikeholde og sikre; dagens løsninger med ...
    • Share Computing Protocols over Fields and Rings 

      Kahrs, Katharina (Master thesis, 2009)
      In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold linear secret sharing schemes, over fields and rings in a compact and concise way. We explain two characterisations of linear ...
    • Smart Home Hacking 

      Kodra, Suela (Master thesis, 2016)
      Smart Home is an intelligent home equipped with devices and communications systems that enables the residents to connect and control their home appliances and systems. This technology has changed the way a consumer interacts ...
    • Smarthus hacking - Sikkerhetsrisiko i Collaborating Smart Solar-powered Microgrids 

      Bui, June Kieu-Van Thi (Master thesis, 2016)
      Det tradisjonelle energinettverket utvikler seg stadig til å bli mer automatisert. Collaborating Smart Solar-powered Micro-grids (CoSSMic) er et system som tar i bruk IKT-løsninger for å tillate lagring av energi og ...
    • SoK of Used Cryptography in Blockchain 

      Raikwar, Mayank; Gligoroski, Danilo; Kralevska, Katina (Journal article; Peer reviewed, 2019)
      The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockchain in different ...
    • SpaceMint - A Cryptocurrency Based on Proofs of Space 

      Hønsi, Trond (Master thesis, 2017)
      Crypto currency, spacemint
    • Specification of security properties by JML 

      Dulaj, Ilir (Master thesis, 2010)
      Nowadays, verification of programs is gaining increased importance. The software industry appears more and more interested in methods and tools to ensure security in their applications. Java Modeling Language has been ...
    • Study of the IEEE Standard 1619.1: Authenticated Encryption with Length Expansion for Storage Devices 

      Gonzalez Torrego, Ignacio (Master thesis, 2009)
      This Thesis will analyze the standard 1619.1 published by the IEEE. The aim of this standard is to provide authenticated encryption to stored data with AES algorithm working in XTS mode. XTS-AES is a 128-bit block cipher ...
    • A study on tighter and more efficient isogeny-based cryptographic protocols 

      Veroni, Mattia (Doctoral theses at NTNU;2023:100, Doctoral thesis, 2023)
      This PhD thesis addresses the following research questions: • RQ 1: Can we prove tight reductions on isogeny-based schemes? • RQ 2: How sound are the assumptions underlying some computational problems in isogeny-based ...