• Bitcoin Unchained 

      Boyd, Colin Alexander; Carr, Christopher; Boyen, Xavier; Haines, Thomas (Journal article, 2017)
      Bitcoin’s distributed ledger is an innovative way of solving the double spending problem in a decentralised system. However, it causes incompressible transaction delays and incentivises consolidation of mining power. We ...
    • A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks 

      Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Boyd, Colin Alexander; Haines, Thomas Edmund (Peer reviewed; Journal article, 2019)
      A Blind Coupon Mechanism (BCM) allows spreading of alerts quietly and quickly over unreliable networks. The BCM primitive ensures that alerts are efficiently broadcast while the nature of these signals are securely hidden. ...
    • Cloud Security without Trust 

      Gilberg, Ole Rasmus (Master thesis, 2014)
      The usage of cloud services is increasing for each day. This applies to private persons which store pictures and documents, as well as bigger corporations whom outsource parts of, or all, handling of their ICT infrastructure ...
    • Comparative Analysis of Bitcoin and Ethereum 

      Rudlang, Marit (Master thesis, 2017)
      Since Bitcoin was launched in 2009, several new cryptocurrencies have been initiated with variations to Bitcoin's original design. Although Bitcoin still remains the most prominent actor in the market, some technical ...
    • Computationally Analyzing the ISO 9798-2.4 Authentication Protocol 

      Hale, Britta J.; Boyd, Colin Alexander (Chapter, 2014)
      We provide a computational analysis of the ISO 9798–2.4 mutual authentication standard protocol in the model of Bellare and Rogaway. In contrast to typical analyses of standardized protocols, we include the optional data ...
    • Content-independent embedding scheme for multi-modal medical image watermarking 

      Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander (Journal article; Peer reviewed, 2015)
      Background As the increasing adoption of information technology continues to offer better distant medical services, the distribution of, and remote access to digital medical images over public networks continues to grow ...
    • Cryptographic access control for big data platforms 

      Viken, Christoffer (Master thesis, 2017)
      This thesis has looked into the performance of select cryptographic algorithms and compared them to each other in the context of big data. The algorithms compared are Advanced Encryption Standard (AES), RSA, and a ...
    • Digital image watermarking: its formal model, fundamental properties and possible attacks 

      Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander (Journal article; Peer reviewed, 2014)
      While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes ...
    • Engineering device pairing with fuzzy cryptography 

      Matetic, Sinisa (Master thesis, 2014)
      Device pairing protocols are a subset of secure communication protocols used to bootstrap a secure channel over an insecure communication link between two or more devices. Example protocols use technologies such as Bluetooth ...
    • Exploring Libraries for Homomorphic Encryption 

      Lokanath, Ashmitha (Master thesis, 2018)
      Fully homomorphic encryption (FHE) is a very modern encryption technique which allows any number of efficient computations to be carried out on the encrypted data without having access to the secret key. FHE schemes can ...
    • From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS 

      Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas (Chapter, 2016)
      Authentication and authenticated encryption with associated data (AEAD) are applied in cryptographic protocols to provide message integrity. The definitions in the literature and the constructions used in practice all ...
    • Human Computable Passwords - Design and Analysis. 

      Kofoed, Anders (Master thesis, 2015)
      Password management is a major issue in the Internet centric world. This project presents the human computable password management scheme by Blocki et al., which makes it possible for human users to calculate passwords ...
    • Identification of malicious behavior patterns for software 

      Khan, Saad Usman (Master thesis, 2014)
      Over the years malware has increased in number and became increasingly harmful. Traditionally, anti-virus suites are used to protect the computers from various forms of malware. In recent years a new technique called ...
    • Information Security Incident Management: A case study about preparedness and readiness 

      Akhtar, Sania (Master thesis, 2014)
      Organisasjoner idag øker sin konkurranseevne ved stadig å benytte seg av nyere teknologi, og avhengigheten rettet til informasjonsteknologi ser bare ut til å bre seg. I dagens samfunn lagres mesteparten av informasjonen ...
    • Key recovery: Inert and public 

      Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas (Journal article; Peer reviewed, 2017)
      We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and ...
    • Long-term Bitcoin Scalability 

      Thorsrud, Erlend Solberg (Master thesis, 2018)
      The interest has grown around Bitcoin as a trustless and decentralized digital payment service. Along with the increase in users and transactions, Bitcoin suffers from challenges regarding scalability. Many solutions have ...
    • Oblivious RAM in practice 

      Thoresen, Olav Sortland (Master thesis, 2019)
      Målet med denne masteroppgaven er å studere ytelsen til nåværende Oblivious RAM (ORAM) løsninger og undersøke hvor praktiske de er i et skylagrings-scenario. For å gjøre dette ble tre ORAM løsninger (ObliviStore, CURIOUS ...
    • Offline Assisted Group Key Exchange 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao (Journal article; Peer reviewed, 2018)
      We design a group key exchange protocol with forward secrecy where most of the participants remain offline until they wish to compute the key. This is well suited to a cloud storage environment where users are often offline, ...
    • On Graph Based Cryptocurrency Systems 

      Helland, Erlend Lid (Master thesis, 2019)
      Denne oppgaven undersøker og sammenligner trekk ved kryptovaluta basert på blokkjeder med kryptovaluta basert på Rettede Asykliske Grafer (RAG). Blokkjedebasert kryptovaluta møter utfordringer på felt som skalering, ...
    • Outsourced incident management services 

      Reyes Zuniga, Alfredo Ramiro (Master thesis, 2015)
      With increasing use of information and communication technologies (ICT), many organizations are outsourcing information security services to managed security service providers (MSSP). This project reports results on current ...