• Analogies of Information Security 

      Sole, Amund Bauck (Master thesis, 2016)
      In this thesis it will be tested wither analogies and metaphors would make it easier to teach the fundamental subjects of information security and hacking to people with no previous background in computer science and only ...
    • Analysis and Visualization of ITS Weather Data 

      Ottesen, Lisa Kleppe (Master thesis, 2017)
      Transportation in the modern-day society has become increasingly complex, and the volume of transport is growing. As a result, we are encountering severe challenges when it comes to the safety of human lives, and how the ...
    • Analysis of Client Anonymity in the Tor Network 

      Hansen, Christian August Holm (Master thesis, 2015)
      The Tor Network has emerged as the most popular service providing sender anonymity on the Internet. It is a community-driven network with most of the infrastructure operated by volunteers. Peer-to-Peer (P2P) file sharing ...
    • Analysis of Mobile Application's Compliance with the General Data Protection Regulation (GDPR) 

      Mangset, Peder Lind (Master thesis, 2018)
      Users increasingly rely on their mobile applications to fulfill everyday activities. Processing of personal data through such tools poses a significant risk to the user's privacy and security. This stems mainly from the ...
    • Analyzing the Correlation in the Behavior of Batteries in IoT Nodes, Powered by Solar Energy 

      Fjærestad, Karen Birgitte Ljones (Master thesis, 2018)
      In the technological world we live in today, Internet of Things (IoT) isbecoming more prominent. IoT uses sensor nodes in order to perform theintended task, and these sensor nodes need power. When powering IoTnodes, the ...
    • Attacking Message Authentication Codes in EFC Using Rainbow Tables 

      Sandvold, Sverre Turter (Master thesis, 2017)
      Electronic Fee Collection (EFC) is a system for collecting fee from cars electronically. EFC contains two main components, an On-board Unit (OBU) and a Roadside Equipment (RSE). Dedicated Short-Range Communications (DSRC) ...
    • Attacking Mobile Privacy By Catching MSISDN Location 

      Ottesen, Christoffer Evjen (Master thesis, 2017)
      Today, we find wireless technology almost everywhere. Easily, we can communicate with people on the other side of the world using our mobile phones. By June 2017, the global number of unique mobile subscribers is over 5 ...
    • Authentication in Protected Core Networking 

      Eie, Kristian Malmkvist (Master thesis, 2016)
      Protected Core Networking (PCN) is a concept that aims to increase information sharing between nations in coalition military operations. PCN specifies the interconnection of national transport networks, called Protected ...
    • Base Station Security Experiments Using USRP 

      Retterstøl, Torjus Bryne (Master thesis, 2015)
      With a coverage of over 90% of the world's population, the cellular technology standard, GSM, is used by millions all over the world every day. The standard is known to have several security weaknesses. One of the weaknesses ...
    • Comparative Analysis of Bitcoin and Ethereum 

      Rudlang, Marit (Master thesis, 2017)
      Since Bitcoin was launched in 2009, several new cryptocurrencies have been initiated with variations to Bitcoin's original design. Although Bitcoin still remains the most prominent actor in the market, some technical ...
    • A Comparison of OpenID Connect and SAML 1.1 

      Bjune, Arne Dahl (Master thesis, 2015)
      This thesis investigates whether OpenID Connect can replace SAML. In addition it provides an understanding of three types of Single Sing-on solutions, namely; SAML, OAuth and OpenID Connect. In order to accomplish this ...
    • Cryptographic access control for big data platforms 

      Viken, Christoffer (Master thesis, 2017)
      This thesis has looked into the performance of select cryptographic algorithms and compared them to each other in the context of big data. The algorithms compared are Advanced Encryption Standard (AES), RSA, and a ...
    • Cybersecurity in the Internet of Things 

      Lange, Kristian Weium (Master thesis, 2016)
      Increasingly, the Internet of Things (IoT) is adapted by businesses to improve operations, processes, and products. This thesis presents a possible structure where IoT systems may utilize a common platform for connectivity, ...
    • Data Access Interface for Innovation on Earth-observation Data 

      Moldestad, Øyvind Y (Master thesis, 2016)
      European Union (EU) adopted an open data policy for the Sentinel constellation of the Copernicus program in 2013. The Copernicus program is now about to transition into its operational phase, which means that it is from ...
    • Deep Packet Inspection Bypass 

      Kjøglum, Thomas (Master thesis, 2015)
      Internet censorship is a problem, where governments and authorities restricts access to what the public can read on the Internet. They use deep packet inspection tools to conduct the censorship. An example of such a tool ...
    • Eavesdropping an EFC transaction using SDR 

      Felipe Blanco, Javier (Master thesis, 2018)
      The use of Electronic Fee Collection (EFC) system is widespread in Europe, to charge drivers for the use of toll roads. It is based on a wireless high-frequency communication between a tag in the car (OBU) and a device ...
    • Evaluating the Security and Usability of Emoji-Based Authentication 

      Rauhut, Markus; Kjellevand, Martin (Master thesis, 2018)
      With the increasing digitization of the world, there is a growing need to prove one's identity and to restrict access to both personal and corporate data. Passwords have several drawbacks, but are still the preferred choice ...
    • Hadoop, and Its Mechanisms for Reliable Storage 

      Midthaug, Ingvild Hovdelien (Master thesis, 2018)
      Nowadays the global amount of digital data increases rapidly. Internet-connected devices generate massive amounts of data through various interactions such as digital communication and file sharing. In a world surrounded ...
    • Human Computable Passwords - Design and Analysis. 

      Kofoed, Anders (Master thesis, 2015)
      Password management is a major issue in the Internet centric world. This project presents the human computable password management scheme by Blocki et al., which makes it possible for human users to calculate passwords ...
    • Improving Security Posture by Learning from Intrusions 

      Nese, Anders (Master thesis, 2018)
      Previous research have found that organisations lack structured approaches for learning from incidents, which results in organisations missing out on opportunities to improve their security posture. In this thesis, qualitative ...