• Bluetooth Low Energy - privacy enhancement for advertisement 

      Wang, Ping (Master thesis, 2014)
      The aim of this project is to design, simulate, and implement a privacy enhancement protocol over BLE advertising channels. The design of the privacy enhancement is generic and modular. Due to the risk of privacy disclosure ...
    • Bootstrapping decentralized overlay networks 

      Midtun, Erik Turøy (Master thesis, 2023)
      Denne masteroppgaven er en fortsettelse av det grunnarbeidet som ble gjort i den tidligere masteroppgaven av Fallang, hvor de fleste av de grunnleggende byggesteinene for et anonymt, desentralisert likemannsnettverk ble ...
    • Bootstrapping the Paysim Financial Simulator for Open Source 

      Lopez-Rojas, Edgar Alonso; Franke, Katrin (Chapter, 2017)
      PaySim Simulator is an approach to the the lack of legitimate datasets on mobile money transactions to perform and experiment with fraud detection techniques. In this paper we used a technique called bootstrapping which ...
    • Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute 

      Abomhara, Mohamed; Yildirim Yayilgan, Sule; Shalaginova, Marina; Székely, Zoltán (Chapter, 2020)
      This paper discusses concerns pertaining to the absoluteness of the right to privacy regarding the use of biometric data for border control. The discussion explains why privacy cannot be absolute from different points of ...
    • A Bound on Peak Age of Information Distribution 

      Li, Zhidu; Zhong, Ailing; Jiang, Yuming; Tang, Tong; Wang, Ruyan (Peer reviewed; Journal article, 2023)
      This paper presents a study on peak age of information (AoI), focusing on its distribution that is more important for AoI guarantees than the mean. Specifically, the relation of peak AoI to the underlying information ...
    • Brain and Body “Fingerprints” of Existential Anxiety and Their Relevance for the Identification of Potential Terrorists: A Research Note 

      Wendelberg, Linda (Peer reviewed; Journal article, 2020)
      The literature on radicalization documents that the identification of individuals who might take part in terrorist acts is difficult. In the field of terrorism studies, there is a lack of research on how the mind of ...
    • Brain wave based authentication 

      Fladby, Kennet (Master thesis, 2008)
      NORSK: Autentisering har blitt en vesentlig del av vår hverdag gjennom systemer som passord, PIN koder, kort lesere, fingeravtrykk-, og netthinne skannere. Alle er utviklet med ´en hensikt; å bekrefte identiteten til ...
    • BRAKE: Biometric Resilient Authenticated Key Exchange 

      Silde, Tjerand Aga; Bauspieß, Pia; Costache, Anamaria; Poljuha, Matej; Tullot, Alexandre; Rathgeb, Christian; Kolberg, Jascha; Busch, Christoph (Journal article; Peer reviewed, 2024)
      Biometric data are uniquely suited for connecting individuals to their digital identities. Deriving cryptographic key exchange from successful biometric authentication therefore gives an additional layer of trust compared ...
    • Brettspillbasert opplæring i informasjonssikkerhet 

      Magnus, Daniel Christian Haraldsen; Flobak, Bendik Berntsen; Al-Shammari, Abu Baker Mohammed Abdullah; Moren, Inger (Bachelor thesis, 2019)
      Opplæring av ansatte innen informasjonssikkerhet er viktig for organisasjoner. Dette blir tradisjonelt gjort gjennom E-læring og kurs. Oppgaven vår gikk ut på å lage et fysisk brettspill som skal brukes til opplæring i ...
    • Bring the user to the network: 5G and beyond 

      Ystgaard, Kaja; De Moor, Katrien (Chapter, 2021)
      Communication networks beyond 5G will bring about a human existence that is ever more virtual. Allowing new communication services with virtual existence and involvement everywhere is likely to redefine and place new demands ...
    • Broadband Development: Who Stands to Gain 

      Brorson, Hans Kristian (Master thesis, 2006)
      The first Internet services which attracted users were e-mail and web. Broadbanddeployment have later enabled multimedia services like voice and video. This development disrupts the future outlook for both telephone ...
    • Broadband Wireless Access for the African Rural District 

      Carlsen, Jan-Erik (Master thesis, 2006)
      This thesis have investigated technical and economical challenges for deploying WiMAX networks in rural districts of Africa. Africa has a fixed telephone line penetration of only 3%, which is a significant barrier for ...
    • Browser eavesdropping: how can we prevent our browsers from revealing our private information 

      Gjerde, Randi (Master thesis, 2005)
      NORSK: Våre nettlesere kan benyttes som verktøy for å finne informasjon om oss, kartlegge våre surfevaner, eller enda verre: finne brukernavn og passord. Denne masteroppgaven ser på hvilken informasjon det er mulig å ...
    • Bruk av autostereoskopisk 3D i videosamtaler 

      Grønningen, Sindre Ruud; Smeplass, Håkon (Master thesis, 2010)
      I oppgaven vurderes det om autostereoskopisk 3D er egnet å bruke i videosamtaler.Bruk av 3D-teknikker for å forbedre den opplevde kvaliteten av video er i dag mer aktuelt enn noen gang før, og 3D får stadig nye bruksområder. ...
    • Bruk av pseudonymiseringsteknologi i nasjonale registre 

      Refsdal, Eirik (Master thesis, 2007)
      Denne oppgaven handler om å identifisere problemer av teknisk art som er til hinder for etablering av nasjonale, pseudonyme helseregistre. For å få en mest mulig komplett oversikt over disse problemene har jeg valgt å ...
    • Bruk av rotårsaksanalyse i informasjonssikkerhet 

      Torres, Henrik Miguel Nacarino; Hellesen, Niclas; Brækken, Erlend Lundsvoll (Bachelor thesis, 2016-08-25)
      Tilnærming til problemer i informasjonssikkerhet (IS) er å identifisere risiko og velge et risikoreduserende tiltak basert på en risikovurdering (RV), eller hendelseshåndtering for problemer som forekommer hyppig. Tilnærmingene ...
    • Brukeraksessstyring i 802.11i RSN 

      Molnes, Kenneth Helge (Master thesis, 2007)
      I emnet TTM4137 Mobil sikkerhet er det utviklet en student lab [2] som muliggjør uttesting av sårbarhet i IEEE 802.11 teknologi. Denne oppgaven skal basere seg på dette og videreutvikle dette verktøyet slik at det egner ...
    • Building a prototype of web API honeypot for Electric Vehicle Charging Network operators 

      Mammadov, Alakbar (Master thesis, 2022)
      Critical infrastructure is one of the main targets for malicious actors. Due to the crucial dependencies of public services on electric power, all components of the power generation and distribution process are of great ...
    • Building a Successful Information Security Awareness Programme for NLI 

      Xiong, Peng (Master thesis, 2011)
      NLI is a Norwegian industrial company. Information security, which is crucial for their business success, has gained more and more attention from NLI‘s top management and IT department. Currently the technical side of ...
    • Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT 

      Shrestha, Manish; Johansen, Christian; Noll, Josef (Chapter, 2020)
      The proliferation of IoT (Internet of Things) though making life easier, comes with security and privacy challenges. We have previously proposed a security classification methodology meant to help in practice build IoT ...