• Obfuscating Malware through Cache Memory Architecture Features 

      Sayin, Caglar (Master thesis, 2014)
      There is no doubt that malicious software (malware) is one of the most important threat in computer security. With increasing of the information systems and computer network usage in the industrial and governmental ...
    • Oblivious RAM in practice 

      Thoresen, Olav Sortland (Master thesis, 2019)
      Målet med denne masteroppgaven er å studere ytelsen til nåværende Oblivious RAM (ORAM) løsninger og undersøke hvor praktiske de er i et skylagrings-scenario. For å gjøre dette ble tre ORAM løsninger (ObliviStore, CURIOUS ...
    • Observable Effects of Selected Phasor Measurement Unit Time Delay Attacks 

      Sivertsen, Gustav Oskar (Master thesis, 2023)
      Det tradisjonelle elektriske kraftnettet, som leverer elektrisk kraft til konsumenter, er i ferd med å bli transformert fra et system som er lukket og sentralstyrt et nettverksstyrt automatisert system for å levere elektrisk ...
    • Observation-Resistant Multifactor Multimodal Authentication 

      Mallasvik, Aleksander Furnes (Master thesis, 2010)
      ENGELSK: This thesis investigates the use of hand gestures as an additional modality in authentication schemes, to thwart the risk of observation (shoulder surfing) attacks. We used the accelerometer already embedded in ...
    • Obtaining precision-recall trade-offs in fuzzy searches of large email corpora 

      Porter, Kyle; Petrovic, Slobodan (Journal article; Peer reviewed, 2018)
      Fuzzy search is often used in digital forensic investigations to find words that are stringologically similar to a chosen keyword. However, a common complaint is the high rate of false positives in big data environments. ...
    • Obtaining situational awareness using Wi-Fi geolocation 

      Rohde Garder, Henriette Kolby (Master thesis, 2020)
      Det overordnede målet for denne masteroppgaven var å undersøke om bruk av geolokaliseringsteknikker (basert på Wi-Fi og rogue-tilgangspunkter) kan være en praktisk måte å øke situasjonforståelse ved å lokalisere og spore ...
    • Offline Assisted Group Key Exchange 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao (Journal article; Peer reviewed, 2018)
      We design a group key exchange protocol with forward secrecy where most of the participants remain offline until they wish to compute the key. This is well suited to a cloud storage environment where users are often offline, ...
    • Offline Signature Verification using GED on Labelled Graphs 

      Do, Duy Thomas (Master thesis, 2021)
      Grafer er kraftige representasjonsverktøy som kan brukes til oppgaver som offline signaturverifisering. Selv om grafer har vært tidlig introdusert, er det bare noen få av de nyeste systemene som tar i bruk grafer, og ingen ...
    • OFM: An Online Fisher Market for Cloud Computing 

      Prasad, Abhinandan S; Arumaithurai, Mayutan; Koll, David; Jiang, Yuming; Fu, Xiaoming (Journal article; Peer reviewed, 2019)
      Currently, cloud computing is a primary enabler of new paradigms such as edge and fog computing. One open issue is the pricing of services or resources. Current pricing schemes are usually oligopolistic and not fair. In ...
    • On Additive and Multiplicative QoS-QoE Models for Multiple QoS Parameters 

      Hossfelt, Tobias; Skorin-Kapov, Lea; Heegaard, Poul Einar; Varela, Martin; Chen, Kuan-ta (Chapter, 2016)
      Generic relationships between QoE and QoS have been inten- sively discussed in literature for single QoS parameters and often found to be logarithmic or exponential. While there are many experimental studies investigating ...
    • On Buffer-Constrained Throughput of a Wireless-Powered Communication System 

      Li, Zhidu; Jiang, Yuming; Gao, Yuehong; Sang, Lin; Yang, Dacheng (Journal article; Peer reviewed, 2019)
      In this paper, the buffer-constrained throughput performance of a multi-user wireless-powered communication (WPC) system is investigated, where energy harvesting follows a non-linear model. The investigation focuses on the ...
    • On Fully Homomorphic Encryption 

      Fauzi, Prastudy (Master thesis, 2012)
      Fully homomorphic encryption is an encryption scheme where a party can receive encrypted data and perform arbitrary operations on this data efficiently.The data remains encrypted throughout, but the operations can be done ...
    • On Graph Based Cryptocurrency Systems 

      Helland, Erlend Lid (Master thesis, 2019)
      Denne oppgaven undersøker og sammenligner trekk ved kryptovaluta basert på blokkjeder med kryptovaluta basert på Rettede Asykliske Grafer (RAG). Blokkjedebasert kryptovaluta møter utfordringer på felt som skalering, ...
    • On Low-Cost Privacy Exposure Attacks in LTE Mobile Communication 

      Olimid, Ruxandra-Florentina; Mjølsnes, Stig Frode (Journal article; Peer reviewed, 2017)
      Abstract The security of mobile communication is of great interest nowadays because of the wide spread and extensive use of mobile communication worldwide. Although LTE has been designed to provide better security than ...
    • On Monolithic and Microservice deployment of Network Functions 

      Sharma, Sachin; Uniyal, Navdeep; Tola, Besmir; Jiang, Yuming (Chapter, 2019)
      Network Function Virtualization (NFV) has recently attracted telecom operators to migrate network functionalities from expensive bespoke hardware systems to virtualized IT infrastructures where they are deployed as software ...
    • On some Challenges for Online Trust and Reputation Systems 

      Tavakolifard, Mozhgan (Doktoravhandlinger ved NTNU, 1503-8181; 2012:127, Doctoral thesis, 2012)
      The Internet form a globally distributed network that provides a ubiquitous medium for interaction, the exchange of ideas, and commerce. The web is pervading our everyday lives in ways that were unimaginable even ten years ...
    • On the Applicability of Synthetic Data for Face Recognition 

      Zhang, Haoyu; Grimmer, Marcel; Ramachandra, Raghavendra; Bylappa Raja, Kiran; Busch, Christoph (Chapter, 2021)
      Face verification has come into increasing focus in various applications including the European Entry/Exit System, which integrates face recognition mechanisms. At the same time, the rapid advancement of biometric ...
    • On the Application of Homomorphic Encryption to Face Identification 

      Drozdowski, Pawel; Buchmann, Nicolas; Rathgeb, Christian; Margraf, Marian; Busch, Christoph (Chapter, 2019)
      The data security and privacy of enrolled subjects is a critical requirement expected from biometric systems. This paper addresses said topic in facial biometric identification. In order to fulfil the properties of ...
    • On the Development and Standardisation of Post-Quantum Cryptography - A Synopsis of the NIST Post-Quantum Cryptography Standardisation Process, its Incentives, and Submissions 

      Legernæs, Maja Worren (Master thesis, 2018)
      Due to developments within the field of quantum computers, the need for developing and implementing quantum-resistant cryptographic algorithms has become more urgent. Using such computers, many of today's most prominent ...
    • On the Development of Situated Collaborative Services 

      Kathayat, Surya Bahadur (Doktoravhandlinger ved NTNU, 1503-8181; 2012:46, Doctoral thesis, 2012)