Browsing NTNU Open by Author "Mjølsnes, Stig Frode"
Now showing items 1-20 of 100
-
A General Framework for Multiparty Computations
Reistad, Tord Ingolf (Doctoral Theses at NTNU, 1503-8181; 2012:143, Doctoral thesis, 2012)Multiparty computation is a computation between multiple players which want to compute a common function based on private input. It was first proposed over 20 years ago and has since matured into a well established science. ... -
A Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme
Turban, Tiina (Master thesis, 2014)Secure multi-party computation allows us to perform analysis on private data without compromising it. Therefore, practical solutions for SMC are very welcome and Sharemind is one of the examples of such frameworks. There ... -
A Smartphone-Based Two-Factor Authentication System Through ID-Porten
Bolstad, Mats; Stenbek, Marius Brekke (Master thesis, 2011)The field of authentication is an immensibly important, and challenging, part of information security. In Norway, ID-porten serves as a front for authentication to public services. Existing electronic identification ... -
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
Tsay, Joe-Kai; Mjølsnes, Stig Frode (Journal article; Peer reviewed, 2012) -
Access control of NUTS uplink
Prasai, Sandesh (Master thesis, 2012)Access control of NUTS uplinkWe will focus in the authentication and integrity part in this thesis. -
Advanced Electronic Signature
Azizi, Fazel Ahmad (Master thesis, 2011)DiFi, Altinn and Lånekassen will implement a national digital signature to sign document submissions and mutual agreements. It is anticipated that a pilot will be launched in 2012.A digital signature is very different to ... -
Analyse av innføring av eResept hos allmennlegen: Kvalitative og kvantitative undersøkelser blant allmennleger i Trondheim
Pedersen, Ola Skuland (Master thesis, 2006)Overgangen fra papirbaserte til elektroniske systemer i helsevesenet er en sentral helsepolitisk målsetning. Denne oppgaven analyserer overgangen fra papirbasert til elektronisk kommunikasjon av reseptinformasjon, kalt ... -
Analysis of Client Anonymity in the Tor Network
Hansen, Christian August Holm (Master thesis, 2015)The Tor Network has emerged as the most popular service providing sender anonymity on the Internet. It is a community-driven network with most of the infrastructure operated by volunteers. Peer-to-Peer (P2P) file sharing ... -
Analysis of Mobile Application's Compliance with the General Data Protection Regulation (GDPR)
Mangset, Peder Lind (Master thesis, 2018)Users increasingly rely on their mobile applications to fulfill everyday activities. Processing of personal data through such tools poses a significant risk to the user's privacy and security. This stems mainly from the ... -
Anonymous Authentication Using Secure Multi-Party Computations
Ahmad, Maqsood (Master thesis, 2011)Typical authentication systems provide a method to allow registered users access to protected resources after the user successfully authenticates. A user successfully authenticates by proving his or her valid identity if ... -
Attacking Message Authentication Codes in EFC Using Rainbow Tables
Sandvold, Sverre Turter (Master thesis, 2017)Electronic Fee Collection (EFC) is a system for collecting fee from cars electronically. EFC contains two main components, an On-board Unit (OBU) and a Roadside Equipment (RSE). Dedicated Short-Range Communications (DSRC) ... -
Attacking Mobile Privacy By Catching MSISDN Location
Ottesen, Christoffer Evjen (Master thesis, 2017)Today, we find wireless technology almost everywhere. Easily, we can communicate with people on the other side of the world using our mobile phones. By June 2017, the global number of unique mobile subscribers is over 5 ... -
Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking
Galteland, Herman; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2017)The cMix scheme was proposed by Chaum et al. in 2016 as the first practical set of cryptographic protocols that offer sender-recipient unlinkability at scale. The claim was that the cMix is secure unless all nodes collude. ... -
Autentisering og tilgangskontroll i system for eSporing
Martinsen, Fredrik Folgerø (Master thesis, 2010)eSporing er et prosjekt for å lage en nasjonal infrastruktur for elektronisk sporing i matkjeden. Denne infrastrukturen, betegnet som eSporingsløsningen, er basert på en tjenesteorientert arkitektur.Med tjenesteorienterte ... -
Automated Security Analysis of Infrastructure Clouds
Bleikertz, Sören (Master thesis, 2010)Cloud computing has gained remarkable popularity in the recent years by a wide spectrum of consumers, ranging from small start-ups to governments. However, its benefits in terms of flexibility, scalability, and low upfront ... -
Base Station Security Experiments Using USRP
Retterstøl, Torjus Bryne (Master thesis, 2015)With a coverage of over 90% of the world's population, the cellular technology standard, GSM, is used by millions all over the world every day. The standard is known to have several security weaknesses. One of the weaknesses ... -
Bluetooth Low Energy - privacy enhancement for advertisement
Wang, Ping (Master thesis, 2014)The aim of this project is to design, simulate, and implement a privacy enhancement protocol over BLE advertising channels. The design of the privacy enhancement is generic and modular. Due to the risk of privacy disclosure ... -
Bruk av pseudonymiseringsteknologi i nasjonale registre
Refsdal, Eirik (Master thesis, 2007)Denne oppgaven handler om å identifisere problemer av teknisk art som er til hinder for etablering av nasjonale, pseudonyme helseregistre. For å få en mest mulig komplett oversikt over disse problemene har jeg valgt å ... -
Brukeraksessstyring i 802.11i RSN
Molnes, Kenneth Helge (Master thesis, 2007)I emnet TTM4137 Mobil sikkerhet er det utviklet en student lab [2] som muliggjør uttesting av sårbarhet i IEEE 802.11 teknologi. Denne oppgaven skal basere seg på dette og videreutvikle dette verktøyet slik at det egner ... -
Comparison of Different Ways to Avoid Internet Traffic Interception
López Luque, José (Master thesis, 2010)As telephone conversations have moved to the Internet, so have those who want to listen in. But the technology needed to do so would entail a dangerous expansion of the government's surveillance powers. Internet users are ...