• A Privacy-enhanced Reputation System for Mobile Ad hoc Services 

      Chen, Yu (Master thesis, 2010)
      MANET has been widely used for distributed communications. Various services can be developed based on MANET. However, lack of trust retards the success of many MANET based services (i.e., MANET services). This thesis work ...
    • A secure mobile phone-based interactive logon in Windows 

      Bodriagov, Oleksandr (Master thesis, 2010)
      Password-based logon schemes have many security weaknesses. Smart card and biometric based authentication solutions are available as a replacement for standard password-based schemes for security sensitive environments. ...
    • Academic Dissemination and Exploitation of a Clean-slate Internetworking Architecture:: The Publish-Subscribe Internet Routing Paradigm 

      Ain, Mark (Master thesis, 2010)
      This thesis is about disseminating and exploiting a clean-slate internetworking architecture through advanced academic courses. We design, execute, and report on the results of an academic course-based engagement and ...
    • An automatic protocol composition checker 

      Kojovic, Ivana (Master thesis, 2012)
      Formal analysis is widely used to prove security properties of the protocols. There are tools to check protocols in isolation, but in fact we use many protocols in parallel or even vertically stacked, e.g. running an ...
    • An Investigation of Spam Filter Optimaltiy: based on Signal Detection Theory 

      Singh, Kuldeep (Master thesis, 2009)
      Unsolicited bulk email, commonly known as spam, represents a significant problem on the Internet. The seriousness of the situation is reflected by the fact that approximately 97% of the total e-mail traffic currently (2009) ...
    • Anonymous Authentication Using Secure Multi-Party Computations 

      Ahmad, Maqsood (Master thesis, 2011)
      Typical authentication systems provide a method to allow registered users access to protected resources after the user successfully authenticates. A user successfully authenticates by proving his or her valid identity if ...
    • Automated Security Analysis of Infrastructure Clouds 

      Bleikertz, Sören (Master thesis, 2010)
      Cloud computing has gained remarkable popularity in the recent years by a wide spectrum of consumers, ranging from small start-ups to governments. However, its benefits in terms of flexibility, scalability, and low upfront ...
    • Automated Security Compliance Tool for the Cloud 

      Ullah, Kazi Wali (Master thesis, 2012)
      Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business requirements, governmental regulations and trust are ...
    • Collaboration-based intelligent service composition at runtime by end users 

      Imtiaz-Ud-Din, K.M (Master thesis, 2011)
      In recent years, technologies in the area of ubiquitous computing have experienced a great advancement. This has resulted in a wide-spread use of services in order to improve the quality of our daily life. For example, a ...
    • DDoS attacks and Countermeasures 

      Rajanna, Puneeth Prasad (Master thesis, 2010)
      Internet has grown leaps and bounds over the last few decades. Internet's phenomenal growth it has attracted users with malicious intent. Distributed Denial of Service (DDoS) attacks have become very common these days. The ...
    • Denial-of-service attack resilience of the GSM access network. 

      Suraev, Maxim (Master thesis, 2011)
      GSM network capable of connecting to any operator providing SIP trunk has beenconstructed to serve as a target for controlled experiment on DoS attacks againstGSM. The usage of this network as a tool to perform DoS attack ...
    • Detection of intermediary hosts through TCP latency propagation 

      Singh, Gurvinder (Master thesis, 2009)
      Today people from all lifestyles, government officials, researchers and executives use internet. The people start to depend on internet for their daily life. However, the increased dependence comes with a great risk. The ...
    • Employing Ethernet Multiple Spanning Tree Protocol in an OpMiGua network 

      Veisllari, Raimena (Master thesis, 2010)
      Hybrid optical packet/circuit switched networking architectures are increasingly becoming an interesting research field. They integrate and combine the high resource utilization of statistically multiplexed packet switched ...
    • Energy Efficiency of Streaming over Mobile Ad-hoc Networks 

      Pattabiraman, Prashanth (Master thesis, 2010)
      Hand held mobile devices are widely used today primarily due to their rich functionality and the ease of portability. However, the battery life of these devices is very limited and deploying resource hungry applications ...
    • Enhancing the Security of Wind power Systems using the IEC 62531 standards 

      Nagarajan, Anand (Master thesis, 2009)
      The lucrative wind energy market has led to the rapid and large scale development of wind power systems in recent times. The wind power infrastructure today can be regarded as complex architectures that are distributed and ...
    • Identity Management with Petname Systems 

      Ferdous, Md. Sadek (Master thesis, 2009)
      In the first part of the thesis, we have focused on providing a brief overview of Petname Systems starting from the introductory concept of Entity, Identity and Identity Management with a brief description on different IdM ...
    • Malware Detection Through Call Graphs 

      Kinable, Joris (Master thesis, 2010)
      Each day, anti-virus companies receive large quantities of potentially harmful executables. Many of the malicious samples among these executables are variations of earlier encountered malware, created by their authors to ...
    • Mobile Payments Regulations: A comparative study between regulatory frameworks for Mobile Payments 

      Ramírez Calderón, Nicolás (Master thesis, 2014)
      The increasing growth of mobile devices penetration has provoked the rise of the mobile payments industry. With many years in the market and with a constant evolution in both its technology and transactions volume, numerous ...
    • Model Driven Development of Web Application with SPACE Method and Tool-suit 

      Rehana, Jinat (Master thesis, 2010)
      Enterprise level software development using traditional software engineeringapproaches with third-generation programming languages is becoming morechallenging and cumbersome task with the increased complexity of ...
    • Modeling Security Risks at the System Design Stage: Alignment of Mal Activity Diagrams and SecureUML to the ISSRM Domain Model 

      Chowdhury, Mohammad Jabed Morshed (Master thesis, 2011)
      Security engineering is one of the important concerns during system development. It should be addressed throughout the whole system development process; however in many cases it is often dealt only during system development ...