Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 328-347 av 2522
-
BioDemo: Biometric Demostrator
(Bachelor thesis, 2015)BioDemo er et program som demostrerer hvordan man skanner inn biometriske data, hvordan disse dataene blir brukt til å sammenligne med andre tilsvarende data, og hvilke kvaliteter disse sammenligningene er basert på. ... -
A biometric cryptosystem scheme based on random projection and neural network
(Peer reviewed; Journal article, 2021) -
Biometric Solutions for Personal Identification
(Master thesis, 2008)With a high level of accuracy and ease of use, the technology of biometrics has the recent years gained popularity and in many cases replaced traditional identification methods based on passwords or tokens. While fingerprint ... -
Bisimulations Respecting Duration and Causality for the Non-interleaving Applied Pi-Calculus
(Peer reviewed; Journal article, 2022)This paper shows how we can make use of an asynchronous transition system, whose transitions are labelled with events and which is equipped with a notion of independence of events, to define non-interleaving semantics for ... -
Bitcoin P2P Network Measurements: A testbed study of the effect of peer selection on transaction propagation and confirmation times
(Peer reviewed; Journal article, 2022)Bitcoin is the first and the most extensive decentralized electronic cryptocurrency system that uses blockchain technology. It uses a peer-to-peer (P2P) network to operate without a central authority and propagate system ... -
Bitcoin Unchained
(Journal article, 2017)Bitcoin’s distributed ledger is an innovative way of solving the double spending problem in a decentralised system. However, it causes incompressible transaction delays and incentivises consolidation of mining power. We ... -
Blended learning using DIGI-resources versus traditional learning for Anatomy and Physiology in nursing students - A Quasi-experimental Study.
(Peer reviewed; Journal article, 2021)In nursing, bioscience is regarded as one of the cornerstones of nursing practice. However, bioscience disciplines as anatomy, physiology and biochemistry are considered challenging for students and the failure rate is ... -
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks
(Peer reviewed; Journal article, 2019)A Blind Coupon Mechanism (BCM) allows spreading of alerts quietly and quickly over unreliable networks. The BCM primitive ensures that alerts are efficiently broadcast while the nature of these signals are securely hidden. ... -
Blockchain as an activity tracker to prevent greenwashing
(Master thesis, 2023)I de siste tiårene, har det foregått et globalt skifte for fokuset på bærekraft som følge av den pågående klimakrisen. Nye lover og tiltak har blitt innført der hensikten er å få fobrukere og bedrifter til å handle ... -
Blockchain for increased trust in virtual health care: Proof-of-concept study
(Peer reviewed; Journal article, 2021)Background: Health care systems are currently undergoing a digital transformation that has been primarily triggered by emerging technologies, such as artificial intelligence, the Internet of Things, 5G, blockchain, and the ... -
Blockchain in healthcare and health sciences—A scoping review
(Journal article; Peer reviewed, 2019)Background Blockchain can be described as an immutable ledger, logging data entries in a decentralized manner. This new technology has been suggested to disrupt a wide range of data-driven domains, including the health ... -
Blockchain state channels with compact states through the use of RSA accumulators
(Peer reviewed; Journal article, 2023)One of the major concerns regarding currently proposed public blockchain systems relates to the feasible transaction processing rate. It is common for such systems to limit this rate to maintain the required levels of ... -
Blockchain State Channels: A State of the Art
(Peer reviewed; Journal article, 2021)Blockchain technology has been quite popular during recent years and it finally seems to present a significant rise with respect to its use for real-world applications. This advancement has brought up a critical challenge ... -
Blockchain Support For Time-Critical Self-Healing In Smart Distribution Grids
(Chapter, 2022)Smart distribution grids have new protection concepts known as fault self-healing whereby Intelligent Electronic Devices (IEDs) can automatically reconfigure the power circuits to isolate faults and restore power to the ... -
Blockchain: Business Potentials
(Master thesis, 2019)Den første kryptovalutaen, Bitcoin, oppstod i kjølvannet av finanskrisen i 2008. Ideen om å ikke være avhengig av store finansielle institusjoner for å håndtere valutatransaksjoner ble født. Siden den gang har et ... -
Bloom’s Learning Outcomes’ Automatic Classification Using LSTM and Pretrained Word Embeddings
(Peer reviewed; Journal article, 2021)Bloom’s taxonomy is a popular model to classify educational learning objectives into different learning levels for three domains including cognitive, affective and psycho motor. Each domain is further detailed into different ... -
Bluetooth enabled Peer2Peer services in ActorFrame
(Master thesis, 2006)To make services for mobile devices more user friendly wireless communication is a very helpful tool. Wireless communication normally requires no or very little user input, and communication over a wireless interface is ... -
Bluetooth enabled Peer2Peer services in ActorFrame
(Master thesis, 2006)To make services for mobile devices more user friendly wireless communication is a very helpful tool. Wireless communication normally requires no or very little user input, and communication over a wireless interface is ... -
Bluetooth in Context acquisition
(Master thesis, 2006)PAN, Personal Area Network, may be described as the connection of personal devices, allowing information exchange over short ranges. This term is used on several of todays short range wireless technologies like Bluetooth, ... -
Bluetooth Low Energy - privacy enhancement for advertisement
(Master thesis, 2014)The aim of this project is to design, simulate, and implement a privacy enhancement protocol over BLE advertising channels. The design of the privacy enhancement is generic and modular. Due to the risk of privacy disclosure ...