Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1034-1053 av 2627
-
A framework for using humanoid robots in the school learning environment
(Peer reviewed; Journal article, 2021)With predictions of robotics and efficient machine learning being the building blocks of the Fourth Industrial Revolution, countries need to adopt a long-term strategy to deal with potential challenges of automation and ... -
Freely-Drifting Small-Satellite Swarms for Sensor Networks in the Arctic
(Chapter, 2018)Satellite communications have been widely used to provide connectivity around the world. However, regions such as the Arctic still have limited coverage, despite the need to monitor this region. Currently, several sensors ... -
Fremtidsrettet bredbåndsscenario
(Master thesis, 2007)Utbygging av infrastruktur for bredbånd er et felt regjeringen i Norge satser på ettersom bredbånd nærmest er en forutsetning i et moderne samfunn. Samtlige husstander skal i følge Soria Moria-erklæringen ha tilbud om ... -
From Advertising to Intelligence: Investigating Tracking through Mobile Devices
(Bachelor thesis, 2024)Mobiltelefoner har blitt en forlengelse av oss selv i vårt daglige liv, og tilbyr en rekke funksjoner som gjør livene våre enklere og mer underholdende. Det finnes imidlertid en bakside; telefonene samler kontinuerlig inn ... -
From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacks
(Chapter, 2022)The maritime domain is among the critical sectors of our way of life. It is undergoing a major digital transformation introducing changes to its operations and technology. The International Maritime Organization urged the ... -
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes
(Peer reviewed; Journal article, 2019)The H2020 European research project GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control - aims to deploy a highly effective security framework for IoT smart home residents through a novel ... -
From Lattice Crypto to Lættis Krypto: Various Approaches to Post-Quantum Key Exchange
(Doctoral theses at NTNU;2023:201, Doctoral thesis, 2023)Key exchange is a cryptographic mechanism: it enables two or more parties to agree upon a shared key that is known only to them, even in the presence of an adversary that has access to all communication between the parties. ... -
From Password to Passwordless: Exploring User Experience Obstacles to the Adoption of FIDO2 Authentication
(Master thesis, 2023)Fast Identity Online (FIDO) Alliance har utviklet standarder for å redusere avhengigheten av passordbasert autentisering. FIDO2 er en passordløs autentiseringsstandard som tilbyr autentisering mot nettbaserte tjenester. ... -
From Password to Passwordless: Exploring User Experience Obstacles to the Adoption of FIDO2 Authentication
(Master thesis, 2023)Fast Identity Online (FIDO) Alliance har utviklet standarder for å redusere avhengigheten av passordbasert autentisering. FIDO2 er en passordløs autentiseringsstandard som tilbyr autentisering mot nettbaserte tjenester. ... -
From QoS Distributions to QoE Distributions: a System's Perspective
(Chapter, 2020)In the context of QoE management, network and service providers commonly rely on models that map system QoS conditions (e.g., system response time, paket loss, etc.) to estimated end user QoE values. Observable QoS conditions ... -
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
(Chapter, 2016)Authentication and authenticated encryption with associated data (AEAD) are applied in cryptographic protocols to provide message integrity. The definitions in the literature and the constructions used in practice all ... -
Fulfilling efficiently SLA availability guarantees in backbone networks
(Master thesis, 2014)The availability and reliability of backbone networks is important tosociety. However, physical, software and unintentional human errorfailures affect the links and nodes in a backbone network. To overcomesuch failures in ... -
Full Reference Image Quality Assessment Based on Saliency Map Analysis
(Journal article; Peer reviewed, 2010)Region saliency has not been fully considered in most previous image quality assessment models. In this article, the contribution of any region to the global quality measure of an image is weighted with variable weights ... -
Full-fingerprint Volumetric Subsurface Imaging using Fourier-Domain Optical Coherence Tomography
(Chapter, 2017)Despite the long history of automated fingerprint recognition, the state-of-the-art 2D sensors still struggle with abraded, dry, wet or greasy fingers, as well as extra-soft skin of the infant fingerprints. But above all, ... -
A functional BCI model by the P2731 working group: psychology
(Peer reviewed; Journal article, 2021)The development of Brain-Computer Interfaces (BCI) gathers experts and specialists in various fields, such as engineering, computer science, medicine, or cognitive neuroscience. Each of these disciplines has specific ... -
Functional Broadcast Repair of Multiple Partial Failures in Wireless Distributed Storage Systems
(Peer reviewed; Journal article, 2021)We consider a distributed storage system with n nodes, where a user can recover the stored file from any k nodes, and study the problem of repairing r partially failed nodes. We consider broadcast repair , that is, d ... -
Fundamental Relationships for Deriving QoE in Systems
(Chapter, 2019)In the context of subjective user studies conducted to derive relationships between influence factors and QoE, user diversity leads to distributions of user scores for test conditions. Such models are commonly exploited ... -
Fusion network performance experiment
(Master thesis, 2013)Hybrid optical packet/circuit switched networking architectures are increasingly becoming an interesting research field. They integrate multiple switching techniques to achieve better quality of service and to improve ... -
Fusion Network Performance: An Integrated Packet/Circuit Hybrid Optical Network
(Master thesis, 2013)IP traffic increase has resulted in a demand for greater capacity of the underlying Ethernet network. As a consequence, not only Internet Service Providers (ISPs) but also telecom operators have migrated their mobile ... -
Future Rail Communication - Implementation Scenarios for LTE
(Master thesis, 2013)Today, Jernbaneverket uses GSM-R as their standard for cellular communication. However, this will change in the future and a proposed solution is to use LTE as the next generation standard. This work shall therefore ...