• Multiple Escrow Agents in VoIP 

      Azfar, Abdullah (Master thesis, 2010)
      Using a Key escrow agent in conjunction with Voice over IP (VoIP) communication ensures that law enforcements agencies (LEAs) can retrieve the session key used to encrypt data between two users in a VoIP session. However, ...
    • On Fully Homomorphic Encryption 

      Fauzi, Prastudy (Master thesis, 2012)
      Fully homomorphic encryption is an encryption scheme where a party can receive encrypted data and perform arbitrary operations on this data efficiently.The data remains encrypted throughout, but the operations can be done ...
    • Performance Evaluation Framework for a SIP-based Telecommunication Call Handling System 

      Sangvanphant, Nattanond (Master thesis, 2009)
      Session Initiation Protocol (SIP) has been used for signaling in many Voice over IP (VoIP) applications. Being more cost-effective than conventional circuit-switched systems, IP-based telecommunication systems are extensively ...
    • Secure Context-Aware Mobile SIP User Agent 

      Merha, Bemnet Tesfaye (Master thesis, 2009)
      Context awareness is an important aspect of pervasive and ubiquitous computing. By utilizing contextual information gathered from the environment, applications can adapt to the user s specific situation. In this thesis, ...
    • Secure data aggregation for wireless sensor network 

      Tran-Thi-Thuy, Trang (Master thesis, 2010)
      Like conventional networks, security is also a big concern in wireless sensor networks. However, security in this type of networks faces not only typical but also new challenges. Constrained devices, changing topology or ...
    • Securing Cloud Storage Service 

      Zapolskas, Vytautas (Master thesis, 2012)
      Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services becomes increasingly important, because for many ...
    • Securing Information Flow in Loosely-Coupled Systems 

      Zvirblis, Linas (Master thesis, 2011)
      Information-flow control is an important element in computer system security, and there has been significant work done in the field by Denning, Volpano, and others. However, most of the work deals with information-flow ...
    • Securing the IaaS Service Model of Cloud Computing Against Compromised Components 

      TaheriMonfared, Aryan (Master thesis, 2011)
      Cloud Computing is a new computing model, and its security aspects require special considerations. New characteristics of the cloud model have introduced new security challenges, and made some of the existing security ...
    • Security Analysis of an RFID-based Fare Collection System 

      Iglesias Galván, Gerardo (Master thesis, 2009)
      Radio frequency identification (RFID) systems aim to identify tags to readers in an open environment where neither visual nor physical contact is needed for communication. Because of their low production costs and small ...
    • Security Analysis of Future Internet Architectures 

      Ballester Lafuente, Carlos (Master thesis, 2010)
      During the last decades, Internet has evolved from host-centric toinformation-centric in the sense that it is information and data what matters,regardless of where it is located. Meanwhile, Internet's architecturestill ...
    • Security as a Service in Cloud for Smartphones 

      subramanian, lakshmi (Master thesis, 2011)
      Smartphone usage has been continuously growing in recent times. Smartphones offer Personal Computer (PC) functionality to the end user, hence they are vulnerable to the same sorts of security threats as desktop computers. ...
    • Security in SOA-Based Healthcare Systems 

      Sassoon, Richard (Master thesis, 2009)
      Healthcare organizations need to handle many kinds of information and integrate different support systems, which may be accessed from external corporations. Service Oriented Architecture (SOA) provides the means to achieve ...
    • Security Issues in OpenStack 

      Slipetskyy, Rostyslav (Master thesis, 2011)
      Security Issues in OpenStack
    • Share Computing Protocols over Fields and Rings 

      Kahrs, Katharina (Master thesis, 2009)
      In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold linear secret sharing schemes, over fields and rings in a compact and concise way. We explain two characterisations of linear ...
    • Specification of security properties by JML 

      Dulaj, Ilir (Master thesis, 2010)
      Nowadays, verification of programs is gaining increased importance. The software industry appears more and more interested in methods and tools to ensure security in their applications. Java Modeling Language has been ...
    • State-of-the-art Study and Design of a Small Footprint Version of the COOS Plugin Framework 

      Khan, Kashif Nizam (Master thesis, 2010)
      GSM and UMTS technologies have already gained a huge market penetrationresulting in millions of customers. Machine-to-Machine (M2M) Communicationis promising to be the next big technology that is going to hit themass market ...
    • Static Analysis of Workflow Language 

      Purba, Gagandeep Singh (Master thesis, 2009)
      This thesis discusses the framework for implementing static analysis on the workflow engine eTray. This framework is used to do analysis of the workflow language using formal methods. We have discussed the workflow language ...
    • Study of TCP friendliness of CEAS routing system in comparison with Distance Vector Routing and Link State Routing 

      Tamrakar, Sandeep (Master thesis, 2009)
      With the continuous development of the Internet technologies new routing requirements have surfaced. In response, several adaptive, stochastic routing algorithms have been purposed. The Cross Entropy Ant System (CEAS) is ...
    • Trusted secure service design: Enhancing trust with the future sim-cards 

      Vilarinho, Thomas Carlyle (Master thesis, 2009)
      The SIM cards are going through several new enhancements both in the underlying hardware and its capabilities. They are becoming secure wireless networked devices containing embedded sensors. This thesis assess how this ...
    • Using Hidden Markov Models for Biometric Gait Recognition 

      Rangarajan, Sathyanarayanan (Master thesis, 2010)
      The need for secure authentication to mobile devices is rapidly increasing with the advent of new technologies. Many of the new mobile devices can be used for various purposes such as internet access, mobile banking, ...