• A Modular Security Analysis of EAP and IEEE 802.11 

      Jacobsen, Håkon (Doctoral theses at NTNU;2017:290, Doctoral thesis, 2017)
      This thesis presents a computational reduction-based security analysis of the Extensible Authentication Protocol (EAP) and the IEEE 802.11 protocol. EAP is a widely used authentication framework while IEEE 802.11 is the ...
    • A Survey of Modern Electronic Voting Technologies 

      Stenbro, Martine (Master thesis, 2010)
      The last decade, electronic voting has evolved from being a mean of counting votes to also offer the possibility of electronically casting votes. From recording votes using punch cards and optical scan systems, electronic ...
    • All in a day's work: Password cracking for the rest of us 

      Blakstad, Jørgen Wahl; Nergård, Rune; Jaatun, Martin Gilje; Gligoroski, Danilo (Chapter, 2009)
      The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Additionally, some of the most popular operating systems such as ...
    • An alternative to the Public Key Infrastructure for the Internet of Things 

      Shingala, Krishna (Master thesis, 2019)
      Identity and Access Management (IAM) is an integral part of the security solution for IoT. Today, the cloud service providers determine the IAM schemes, and the constrained IoT devices implement them. The IoT services adapt ...
    • An automatic protocol composition checker 

      Kojovic, Ivana (Master thesis, 2012)
      Formal analysis is widely used to prove security properties of the protocols. There are tools to check protocols in isolation, but in fact we use many protocols in parallel or even vertically stacked, e.g. running an ...
    • An Inter-Domain Key Management Scheme for ZigBee Networks 

      Tønseth, Ivar (Master thesis, 2010)
      Wireless networks are increasingly penetrating new range of applications, from industry controllers, to houshold appliances. The wireless standard, IEEE 802.15.4/ZigBee, combines simple operation with low power consumption. ...
    • An Optimized Implementation of a Succinct Non-Interactive Zero-Knowledge Argument System 

      Hendri, Hendri (Master thesis, 2013)
      In this thesis, we construct an implementation of succinct non-interactive zero knowledge argument system. A non-interactive zero knowledge argument system is a protocol for a party (usually known as Prover) to provide a ...
    • Authentication in Protected Core Networking 

      Eie, Kristian Malmkvist (Master thesis, 2016)
      Protected Core Networking (PCN) is a concept that aims to increase information sharing between nations in coalition military operations. PCN specifies the interconnection of national transport networks, called Protected ...
    • Authentication: From Passwords to Biometrics: An implementation of a speaker recognition system on Android 

      Heimark, Erlend (Master thesis, 2012)
      We implement a biometric authentication system on the Android platform, which is based on text-dependent speaker recognition. The Android version used in the application is Android 4.0. The application makes use of the ...
    • Automated Security Compliance Tool for the Cloud 

      Ullah, Kazi Wali (Master thesis, 2012)
      Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business requirements, governmental regulations and trust are ...
    • Biometric Solutions for Personal Identification 

      Larsen, Tormod Emsell (Master thesis, 2008)
      With a high level of accuracy and ease of use, the technology of biometrics has the recent years gained popularity and in many cases replaced traditional identification methods based on passwords or tokens. While fingerprint ...
    • Blockchain in healthcare and health sciences—A scoping review 

      Hasselgren, Anton; Kralevska, Katina; Gligoroski, Danilo; Pedersen, Sindre Andre; Faxvaag, Arild (Journal article; Peer reviewed, 2019)
      Background Blockchain can be described as an immutable ledger, logging data entries in a decentralized manner. This new technology has been suggested to disrupt a wide range of data-driven domains, including the health ...
    • Classification of Keys in MQQ-SIG 

      Jacobsen, Håkon (Master thesis, 2012)
      The security of almost all public-key cryptography is based on some computationally hard problem. Most prominent are the problems of factoring integers into primes and computing discrete logarithms in finite groups. However, ...
    • Cloud Storage Vault 

      Haver, Eirik; Melvold, Eivind; Ruud, Pål (Master thesis, 2011)
      Today, major IT-companies, such as Microsoft, Amazon and Google, are offering online storage services to their customers. This is a favourable solution -- as opposed to regular storage -- in terms of low costs, reliability, ...
    • Compact Implementation of BLUE MIDNIGHT WISH-256 Hash Function on Xilinx FPGA Platform 

      El Hadedy, Mohamed; Gligoroski, Danilo; Knapskog, Svein J.; Margala, Martin (Journal article; Peer reviewed, 2010)
    • A Comparison of OpenID Connect and SAML 1.1 

      Bjune, Arne Dahl (Master thesis, 2015)
      This thesis investigates whether OpenID Connect can replace SAML. In addition it provides an understanding of three types of Single Sing-on solutions, namely; SAML, OAuth and OpenID Connect. In order to accomplish this ...
    • Cryptoprocessing on the Arduino - Protecting user data using affordable microcontroller development kits 

      Johannesen, Stig Tore (Master thesis, 2014)
      There is a growing trend of data breaches, which this report looks into. The breaches often turn out to have, at their core, an element of either poor security management, or outdated or incorrectly applied security ...
    • Decoding GSM 

      Glendrange, Magnus; Hove, Kristian; Hvideberg, Espen (Master thesis, 2010)
      We have participated in the creation of almost two terabytes of tables aimed at cracking A5/1, the most common ciphering algorithm used in GSM. Given 114-bit of known plaintext, we are able to recover the session key with ...
    • Design and implementation of a non-aggressive automated penetration testing tool: An approach to automated penetration testing focusing on stability and integrity for usage in production environments 

      Viggiani, Fabio (Master thesis, 2013)
      The focus of this Master's thesis project is automated penetration testing. A penetration test is a practice used by security professionals to assess the security of a system. This process consists of attacking the system ...
    • Design of a Secure System of Mutual Authentication Using RFID JavaCards Over SIP 

      Llop Donet, Jose Ignacio (Master thesis, 2009)
      The necessity of mutual authentication is growing due the need to perform sensitive operations over the Internet. It is a perpetual problem to find a secure place to store the keys. In this Master Thesis we present an ...