• 5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept 

      Haga, Simen; Esmaeily, Ali; Kralevska, Katina; Gligoroski, Danilo (Chapter, 2020)
      The fifth-generation (5G) mobile networks aim to host different types of services on the same physical infrastructure. Network slicing is considered as the key enabler for achieving this goal. Although there is some progress ...
    • A Modular Security Analysis of EAP and IEEE 802.11 

      Jacobsen, Håkon (Doctoral theses at NTNU;2017:290, Doctoral thesis, 2017)
      This thesis presents a computational reduction-based security analysis of the Extensible Authentication Protocol (EAP) and the IEEE 802.11 protocol. EAP is a widely used authentication framework while IEEE 802.11 is the ...
    • A Survey of Modern Electronic Voting Technologies 

      Stenbro, Martine (Master thesis, 2010)
      The last decade, electronic voting has evolved from being a mean of counting votes to also offer the possibility of electronically casting votes. From recording votes using punch cards and optical scan systems, electronic ...
    • A Survey of Quantum-safe Digital Signatures and their building blocks 

      Sridhar, Sahana (Master thesis, 2021)
      Sikkerhet og personvern på internett som vi kjenner i dag, er truet av den nye teknologien for å bygge større og kommersielle kvantecomputere. Selv om kvantecomputere som er bygget er relativt små, og ikke veldig effektive ...
    • All in a day's work: Password cracking for the rest of us 

      Blakstad, Jørgen Wahl; Nergård, Rune; Jaatun, Martin Gilje; Gligoroski, Danilo (Chapter, 2009)
      The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Additionally, some of the most popular operating systems such as ...
    • An alternative to the Public Key Infrastructure for the Internet of Things 

      Shingala, Krishna (Master thesis, 2019)
      Identity and Access Management (IAM) is an integral part of the security solution for IoT. Today, the cloud service providers determine the IAM schemes, and the constrained IoT devices implement them. The IoT services adapt ...
    • An automatic protocol composition checker 

      Kojovic, Ivana (Master thesis, 2012)
      Formal analysis is widely used to prove security properties of the protocols. There are tools to check protocols in isolation, but in fact we use many protocols in parallel or even vertically stacked, e.g. running an ...
    • An Extensive Analysis of the Current Vulnerability Landscape in Docker Hub Images 

      Wist, Katrine; Helsem, Malene (Master thesis, 2020)
      I løpet av de siste årene har bruken av containerteknologi skutt til værs med Docker som den ledende containerplattformen. Dockers plattform for offentlig deling av containerbilder (images), kalt Docker Hub, inneholder i ...
    • An Extensive Analysis of the Current Vulnerability Landscape in Docker Hub Images 

      Wist, Katrine; Helsem, Malene (Master thesis, 2020)
      I løpet av de siste årene har bruken av containerteknologi skutt til værs med Docker som den ledende containerplattformen. Dockers plattform for offentlig deling av containerbilder (images), kalt Docker Hub, inneholder i ...
    • An Inter-Domain Key Management Scheme for ZigBee Networks 

      Tønseth, Ivar (Master thesis, 2010)
      Wireless networks are increasingly penetrating new range of applications, from industry controllers, to houshold appliances. The wireless standard, IEEE 802.15.4/ZigBee, combines simple operation with low power consumption. ...
    • An Optimized Implementation of a Succinct Non-Interactive Zero-Knowledge Argument System 

      Hendri, Hendri (Master thesis, 2013)
      In this thesis, we construct an implementation of succinct non-interactive zero knowledge argument system. A non-interactive zero knowledge argument system is a protocol for a party (usually known as Prover) to provide a ...
    • Analyzing the IoT Threat Landscape Within University Network Environments Using Honeypots 

      Peinert, Trine Cecilia; Giset, Ingvild Bye (Master thesis, 2020)
      Tingenes internett (IoT) har blitt essensielt innen flere områder i samfunnet, inkludert utdanningssektoren. Imidlertid mangler mange av dagens IoT-enheter tilstrekkelige sikkerhetsmekanismer, og har derfor blitt et lukrativt ...
    • Analyzing the IoT Threat Landscape Within University Network Environments Using Honeypots 

      Peinert, Trine Cecilia; Giset, Ingvild Bye (Master thesis, 2020)
      Tingenes internett (IoT) har blitt essensielt innen flere områder i samfunnet, inkludert utdanningssektoren. Imidlertid mangler mange av dagens IoT-enheter tilstrekkelige sikkerhetsmekanismer, og har derfor blitt et lukrativt ...
    • Authentication in Protected Core Networking 

      Eie, Kristian Malmkvist (Master thesis, 2016)
      Protected Core Networking (PCN) is a concept that aims to increase information sharing between nations in coalition military operations. PCN specifies the interconnection of national transport networks, called Protected ...
    • Authentication: From Passwords to Biometrics: An implementation of a speaker recognition system on Android 

      Heimark, Erlend (Master thesis, 2012)
      We implement a biometric authentication system on the Android platform, which is based on text-dependent speaker recognition. The Android version used in the application is Android 4.0. The application makes use of the ...
    • Automated Security Compliance Tool for the Cloud 

      Ullah, Kazi Wali (Master thesis, 2012)
      Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business requirements, governmental regulations and trust are ...
    • Biometric Solutions for Personal Identification 

      Larsen, Tormod Emsell (Master thesis, 2008)
      With a high level of accuracy and ease of use, the technology of biometrics has the recent years gained popularity and in many cases replaced traditional identification methods based on passwords or tokens. While fingerprint ...
    • Blockchain in healthcare and health sciences—A scoping review 

      Hasselgren, Anton; Kralevska, Katina; Gligoroski, Danilo; Pedersen, Sindre Andre; Faxvaag, Arild (Journal article; Peer reviewed, 2019)
      Background Blockchain can be described as an immutable ledger, logging data entries in a decentralized manner. This new technology has been suggested to disrupt a wide range of data-driven domains, including the health ...
    • Classification of Keys in MQQ-SIG 

      Jacobsen, Håkon (Master thesis, 2012)
      The security of almost all public-key cryptography is based on some computationally hard problem. Most prominent are the problems of factoring integers into primes and computing discrete logarithms in finite groups. However, ...
    • Cloud Storage Vault 

      Haver, Eirik; Melvold, Eivind; Ruud, Pål (Master thesis, 2011)
      Today, major IT-companies, such as Microsoft, Amazon and Google, are offering online storage services to their customers. This is a favourable solution -- as opposed to regular storage -- in terms of low costs, reliability, ...