Browsing Institutt for informasjonssikkerhet og kommunikasjonsteknologi by Subject "MSSECMOB Master in Security and Mobile Computing"
Now showing items 1-20 of 41
-
A Privacy-enhanced Reputation System for Mobile Ad hoc Services
(Master thesis, 2010)MANET has been widely used for distributed communications. Various services can be developed based on MANET. However, lack of trust retards the success of many MANET based services (i.e., MANET services). This thesis work ... -
A secure mobile phone-based interactive logon in Windows
(Master thesis, 2010)Password-based logon schemes have many security weaknesses. Smart card and biometric based authentication solutions are available as a replacement for standard password-based schemes for security sensitive environments. ... -
Academic Dissemination and Exploitation of a Clean-slate Internetworking Architecture:: The Publish-Subscribe Internet Routing Paradigm
(Master thesis, 2010)This thesis is about disseminating and exploiting a clean-slate internetworking architecture through advanced academic courses. We design, execute, and report on the results of an academic course-based engagement and ... -
An automatic protocol composition checker
(Master thesis, 2012)Formal analysis is widely used to prove security properties of the protocols. There are tools to check protocols in isolation, but in fact we use many protocols in parallel or even vertically stacked, e.g. running an ... -
An Investigation of Spam Filter Optimaltiy: based on Signal Detection Theory
(Master thesis, 2009)Unsolicited bulk email, commonly known as spam, represents a significant problem on the Internet. The seriousness of the situation is reflected by the fact that approximately 97% of the total e-mail traffic currently (2009) ... -
Anonymous Authentication Using Secure Multi-Party Computations
(Master thesis, 2011)Typical authentication systems provide a method to allow registered users access to protected resources after the user successfully authenticates. A user successfully authenticates by proving his or her valid identity if ... -
Automated Security Analysis of Infrastructure Clouds
(Master thesis, 2010)Cloud computing has gained remarkable popularity in the recent years by a wide spectrum of consumers, ranging from small start-ups to governments. However, its benefits in terms of flexibility, scalability, and low upfront ... -
Automated Security Compliance Tool for the Cloud
(Master thesis, 2012)Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business requirements, governmental regulations and trust are ... -
Collaboration-based intelligent service composition at runtime by end users
(Master thesis, 2011)In recent years, technologies in the area of ubiquitous computing have experienced a great advancement. This has resulted in a wide-spread use of services in order to improve the quality of our daily life. For example, a ... -
DDoS attacks and Countermeasures
(Master thesis, 2010)Internet has grown leaps and bounds over the last few decades. Internet's phenomenal growth it has attracted users with malicious intent. Distributed Denial of Service (DDoS) attacks have become very common these days. The ... -
Denial-of-service attack resilience of the GSM access network.
(Master thesis, 2011)GSM network capable of connecting to any operator providing SIP trunk has beenconstructed to serve as a target for controlled experiment on DoS attacks againstGSM. The usage of this network as a tool to perform DoS attack ... -
Detection of intermediary hosts through TCP latency propagation
(Master thesis, 2009)Today people from all lifestyles, government officials, researchers and executives use internet. The people start to depend on internet for their daily life. However, the increased dependence comes with a great risk. The ... -
Employing Ethernet Multiple Spanning Tree Protocol in an OpMiGua network
(Master thesis, 2010)Hybrid optical packet/circuit switched networking architectures are increasingly becoming an interesting research field. They integrate and combine the high resource utilization of statistically multiplexed packet switched ... -
Energy Efficiency of Streaming over Mobile Ad-hoc Networks
(Master thesis, 2010)Hand held mobile devices are widely used today primarily due to their rich functionality and the ease of portability. However, the battery life of these devices is very limited and deploying resource hungry applications ... -
Enhancing the Security of Wind power Systems using the IEC 62531 standards
(Master thesis, 2009)The lucrative wind energy market has led to the rapid and large scale development of wind power systems in recent times. The wind power infrastructure today can be regarded as complex architectures that are distributed and ... -
Identity Management with Petname Systems
(Master thesis, 2009)In the first part of the thesis, we have focused on providing a brief overview of Petname Systems starting from the introductory concept of Entity, Identity and Identity Management with a brief description on different IdM ... -
Malware Detection Through Call Graphs
(Master thesis, 2010)Each day, anti-virus companies receive large quantities of potentially harmful executables. Many of the malicious samples among these executables are variations of earlier encountered malware, created by their authors to ... -
Mobile Payments Regulations: A comparative study between regulatory frameworks for Mobile Payments
(Master thesis, 2014)The increasing growth of mobile devices penetration has provoked the rise of the mobile payments industry. With many years in the market and with a constant evolution in both its technology and transactions volume, numerous ... -
Model Driven Development of Web Application with SPACE Method and Tool-suit
(Master thesis, 2010)Enterprise level software development using traditional software engineeringapproaches with third-generation programming languages is becoming morechallenging and cumbersome task with the increased complexity of ... -
Modeling Security Risks at the System Design Stage: Alignment of Mal Activity Diagrams and SecureUML to the ISSRM Domain Model
(Master thesis, 2011)Security engineering is one of the important concerns during system development. It should be addressed throughout the whole system development process; however in many cases it is often dealt only during system development ...