• Access control of NUTS uplink 

      Prasai, Sandesh (Master thesis, 2012)
      Access control of NUTS uplinkWe will focus in the authentication and integrity part in this thesis.
    • Analysis of Key Industrial WSN MAC Protocols 

      Koh, Kenneth Johannesen (Master thesis, 2014)
      This paper looks at two MAC protocols for wireless sensor networksfor use in industrial applications developed at the Ubicom Lab, at theUniversity of Ulsan. A theoretical comparison of the MAC protocolsare performed to ...
    • Android Apps and Permissions: Security and Privacy Risks 

      Boksasp, Trond; Utnes, Eivind (Master thesis, 2012)
      This thesis investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. ...
    • Anomaly Detection and Identification in Feature Based Systems: An Empirical Evaluation 

      Ask, Magnus Bjørnar Røgeberg; Skrautvol, Helge (Master thesis, 2011)
      Performance analysis and comparison of different techniques used for anomaly detection in packet switched backbone networks.
    • Autentisering og tilgangskontroll i system for eSporing 

      Martinsen, Fredrik Folgerø (Master thesis, 2010)
      eSporing er et prosjekt for å lage en nasjonal infrastruktur for elektronisk sporing i matkjeden. Denne infrastrukturen, betegnet som eSporingsløsningen, er basert på en tjenesteorientert arkitektur.Med tjenesteorienterte ...
    • Authentication: From Passwords to Biometrics: An implementation of a speaker recognition system on Android 

      Heimark, Erlend (Master thesis, 2012)
      We implement a biometric authentication system on the Android platform, which is based on text-dependent speaker recognition. The Android version used in the application is Android 4.0. The application makes use of the ...
    • Bruk av rotårsaksanalyse i informasjonssikkerhet 

      Torres, Henrik Miguel Nacarino; Hellesen, Niclas; Brækken, Erlend Lundsvoll (Bachelor thesis, 2016-08-25)
      Tilnærming til problemer i informasjonssikkerhet (IS) er å identifisere risiko og velge et risikoreduserende tiltak basert på en risikovurdering (RV), eller hendelseshåndtering for problemer som forekommer hyppig. Tilnærmingene ...
    • Cheating in Online Games: A Case Study of Bots and Bot-Detection in Browser-Based Multiplayer Games 

      Wendel, Erik (Master thesis, 2012)
      The video and computer gaming industry has seen a significant rise in popularity over the last decades and is now the worlds biggest digital entertainment industry [market-gamingvsmovies]. Where games meant Space Invaders ...
    • Classification of Keys in MQQ-SIG 

      Jacobsen, Håkon (Master thesis, 2012)
      The security of almost all public-key cryptography is based on some computationally hard problem. Most prominent are the problems of factoring integers into primes and computing discrete logarithms in finite groups. However, ...
    • Cloud Storage Vault 

      Haver, Eirik; Melvold, Eivind; Ruud, Pål (Master thesis, 2011)
      Today, major IT-companies, such as Microsoft, Amazon and Google, are offering online storage services to their customers. This is a favourable solution -- as opposed to regular storage -- in terms of low costs, reliability, ...
    • Comparison of Different Ways to Avoid Internet Traffic Interception 

      López Luque, José (Master thesis, 2010)
      As telephone conversations have moved to the Internet, so have those who want to listen in. But the technology needed to do so would entail a dangerous expansion of the government's surveillance powers. Internet users are ...
    • Cryptanalysis of IEEE 802.11i TKIP. 

      Lodhi, Ammar (Master thesis, 2010)
      This thesis is based upon the work of Beck and Tews [ 24 ]. It presents and experimentally Validate the Beck and Tews attack on a network with QoS client Associated with a Non- QoS AP.This is done by Slightly extending the ...
    • Detecting MAC Spoofing Attacks in 802.11 Networks through Fingerprinting on the MAC Layer 

      Idland, Christer (Master thesis, 2011)
      In order to provide hassle-free connection options many wireless local area network (WLAN) providers choose to have their networks completely open. In other words there is no password required in order to connect. Such ...
    • Event Driven Adaptive Security in Internet of Things 

      Aman, Waqas; Snekkenes, Einar (Chapter, 2014)
      With Internet of Things (IoT), new and improved personal, commercial and social opportunities can be explored and availed. However, with this extended network, the corresponding threat landscape will become more complex ...
    • Implementing a Secure Ad Hoc Network 

      Graarud, Espen Grannes (Master thesis, 2011)
      In emergency situations such as natural disasters the emergency personell shouldbe able to establish communication fast and reliably. Depending on the nature ofthe disaster one cannot rely on existing communication ...
    • Integration and verification of a keyed-hash message authentication scheme based on broadcast timestamps for NUTS 

      Muench, Marius (Master thesis, 2014)
      The NTNU Test Satellite (NUTS) is a small satellite developed by students of the Norwegian University of Science and Technology (NTNU). The satellite follows the CubeSat specification and the development started in 2010, ...
    • Location-Aware Trust and Reputation Management for Online Social Networks 

      Obadya, Mona (Master thesis, 2012)
      The task for this Master thesis is to investigate location-aware trust/reputationmanagement system for online social networks.Social networking Services (SNS) are online platforms for social interactionsover the Internet, ...
    • Multi Protocol Label Switching Transport Profile (MPLS-TP) in OpMiGua hybrid network 

      Katsavos, Christos (Master thesis, 2010)
      This thesis presents the combination of MPLS-TP protocol with an integrated hybridnetwork, the Opmigua network. It is presented that the MPLS-TP protocol is applicableand follows all the requirements to be compatible with ...
    • Multibiometric Systems 

      Dhamala, Pushpa (Master thesis, 2012)
      Multibiometric Systems
    • National Authentication Systems 

      Sandnes, Are Haugen (Master thesis, 2012)
      Information security has to adapt to an ever-changing environment. Recently there has been a significant increase in the use of smartphones and other mobile devices to access services on the Internet that originally is ...