Now showing items 1-20 of 112

    • 5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept 

      Haga, Simen; Esmaeily, Ali; Kralevska, Katina; Gligoroski, Danilo (Chapter, 2020)
      The fifth-generation (5G) mobile networks aim to host different types of services on the same physical infrastructure. Network slicing is considered as the key enabler for achieving this goal. Although there is some progress ...
    • A Modular Security Analysis of EAP and IEEE 802.11 

      Jacobsen, Håkon (Doctoral theses at NTNU;2017:290, Doctoral thesis, 2017)
      This thesis presents a computational reduction-based security analysis of the Extensible Authentication Protocol (EAP) and the IEEE 802.11 protocol. EAP is a widely used authentication framework while IEEE 802.11 is the ...
    • A Survey of Modern Electronic Voting Technologies 

      Stenbro, Martine (Master thesis, 2010)
      The last decade, electronic voting has evolved from being a mean of counting votes to also offer the possibility of electronically casting votes. From recording votes using punch cards and optical scan systems, electronic ...
    • A Survey of Quantum-safe Digital Signatures and their building blocks 

      Sridhar, Sahana (Master thesis, 2021)
      Sikkerhet og personvern på internett som vi kjenner i dag, er truet av den nye teknologien for å bygge større og kommersielle kvantecomputere. Selv om kvantecomputere som er bygget er relativt små, og ikke veldig effektive ...
    • All in a day's work: Password cracking for the rest of us 

      Blakstad, Jørgen Wahl; Nergård, Rune; Jaatun, Martin Gilje; Gligoroski, Danilo (Chapter, 2009)
      The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Additionally, some of the most popular operating systems such as ...
    • An alternative to the Public Key Infrastructure for the Internet of Things 

      Shingala, Krishna (Master thesis, 2019)
      Identity and Access Management (IAM) is an integral part of the security solution for IoT. Today, the cloud service providers determine the IAM schemes, and the constrained IoT devices implement them. The IoT services adapt ...
    • An automatic protocol composition checker 

      Kojovic, Ivana (Master thesis, 2012)
      Formal analysis is widely used to prove security properties of the protocols. There are tools to check protocols in isolation, but in fact we use many protocols in parallel or even vertically stacked, e.g. running an ...
    • An Extensive Analysis of the Current Vulnerability Landscape in Docker Hub Images 

      Wist, Katrine; Helsem, Malene (Master thesis, 2020)
      I løpet av de siste årene har bruken av containerteknologi skutt til værs med Docker som den ledende containerplattformen. Dockers plattform for offentlig deling av containerbilder (images), kalt Docker Hub, inneholder i ...
    • An Extensive Analysis of the Current Vulnerability Landscape in Docker Hub Images 

      Wist, Katrine; Helsem, Malene (Master thesis, 2020)
      I løpet av de siste årene har bruken av containerteknologi skutt til værs med Docker som den ledende containerplattformen. Dockers plattform for offentlig deling av containerbilder (images), kalt Docker Hub, inneholder i ...
    • An Inter-Domain Key Management Scheme for ZigBee Networks 

      Tønseth, Ivar (Master thesis, 2010)
      Wireless networks are increasingly penetrating new range of applications, from industry controllers, to houshold appliances. The wireless standard, IEEE 802.15.4/ZigBee, combines simple operation with low power consumption. ...
    • An Optimized Implementation of a Succinct Non-Interactive Zero-Knowledge Argument System 

      Hendri, Hendri (Master thesis, 2013)
      In this thesis, we construct an implementation of succinct non-interactive zero knowledge argument system. A non-interactive zero knowledge argument system is a protocol for a party (usually known as Prover) to provide a ...
    • Analyzing the IoT Threat Landscape Within University Network Environments Using Honeypots 

      Peinert, Trine Cecilia; Giset, Ingvild Bye (Master thesis, 2020)
      Tingenes internett (IoT) har blitt essensielt innen flere områder i samfunnet, inkludert utdanningssektoren. Imidlertid mangler mange av dagens IoT-enheter tilstrekkelige sikkerhetsmekanismer, og har derfor blitt et lukrativt ...
    • Analyzing the IoT Threat Landscape Within University Network Environments Using Honeypots 

      Peinert, Trine Cecilia; Giset, Ingvild Bye (Master thesis, 2020)
      Tingenes internett (IoT) har blitt essensielt innen flere områder i samfunnet, inkludert utdanningssektoren. Imidlertid mangler mange av dagens IoT-enheter tilstrekkelige sikkerhetsmekanismer, og har derfor blitt et lukrativt ...
    • Authentication in Protected Core Networking 

      Eie, Kristian Malmkvist (Master thesis, 2016)
      Protected Core Networking (PCN) is a concept that aims to increase information sharing between nations in coalition military operations. PCN specifies the interconnection of national transport networks, called Protected ...
    • Authentication: From Passwords to Biometrics: An implementation of a speaker recognition system on Android 

      Heimark, Erlend (Master thesis, 2012)
      We implement a biometric authentication system on the Android platform, which is based on text-dependent speaker recognition. The Android version used in the application is Android 4.0. The application makes use of the ...
    • Automated Security Compliance Tool for the Cloud 

      Ullah, Kazi Wali (Master thesis, 2012)
      Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business requirements, governmental regulations and trust are ...
    • Biometric Solutions for Personal Identification 

      Larsen, Tormod Emsell (Master thesis, 2008)
      With a high level of accuracy and ease of use, the technology of biometrics has the recent years gained popularity and in many cases replaced traditional identification methods based on passwords or tokens. While fingerprint ...
    • Blockchain as an activity tracker to prevent greenwashing 

      Udnes, Henrik (Master thesis, 2023)
      I de siste tiårene, har det foregått et globalt skifte for fokuset på bærekraft som følge av den pågående klimakrisen. Nye lover og tiltak har blitt innført der hensikten er å få fobrukere og bedrifter til å handle ...
    • Blockchain for increased trust in virtual health care: Proof-of-concept study 

      Hasselgren, Anton; Rensaa, Jens-Andreas Hanssen; Kralevska, Katina; Gligoroski, Danilo; Faxvaag, Arild (Peer reviewed; Journal article, 2021)
      Background: Health care systems are currently undergoing a digital transformation that has been primarily triggered by emerging technologies, such as artificial intelligence, the Internet of Things, 5G, blockchain, and the ...
    • Blockchain for trust and transparency in health information systems 

      Hasselgren, Anton (Doctoral theses at NTNU;2023:121, Doctoral thesis, 2023)
      Background The research presented in this thesis explores whether the emerging technology of blockchain can provide value in the health domain. The research project is, in essence, interdisciplinary, migrating across ...