• A Smartphone-Based Two-Factor Authentication System Through ID-Porten 

      Bolstad, Mats; Stenbek, Marius Brekke (Master thesis, 2011)
      The field of authentication is an immensibly important, and challenging, part of information security. In Norway, ID-porten serves as a front for authentication to public services. Existing electronic identification ...
    • A Survey of Modern Electronic Voting Technologies 

      Stenbro, Martine (Master thesis, 2010)
      The last decade, electronic voting has evolved from being a mean of counting votes to also offer the possibility of electronically casting votes. From recording votes using punch cards and optical scan systems, electronic ...
    • Advanced Electronic Signature 

      Azizi, Fazel Ahmad (Master thesis, 2011)
      DiFi, Altinn and Lånekassen will implement a national digital signature to sign document submissions and mutual agreements. It is anticipated that a pilot will be launched in 2012.A digital signature is very different to ...
    • Anomaly Detection and Identification in Feature Based Systems: An Empirical Evaluation 

      Ask, Magnus Bjørnar Røgeberg; Skrautvol, Helge (Master thesis, 2011)
      Performance analysis and comparison of different techniques used for anomaly detection in packet switched backbone networks.
    • Automatic Keystone Correction in Projector Phones using Computer Vision 

      Gundersen, Marius Heggen (Master thesis, 2011)
      A Pico projector is an emerging technology which is just now making its way into smartphones. These projectors phones enable consumers to share movies, presentations andvideo-conferences with others by projecting them on ...
    • Cloud Storage Vault 

      Haver, Eirik; Melvold, Eivind; Ruud, Pål (Master thesis, 2011)
      Today, major IT-companies, such as Microsoft, Amazon and Google, are offering online storage services to their customers. This is a favourable solution -- as opposed to regular storage -- in terms of low costs, reliability, ...
    • Composition of New Features into a Wireless Nurse Call System 

      Morey I Pasqual, Antoni (Master thesis, 2011)
      Healthcare needs are evolving constantly, some of these needs are already being covered by current technology but some are still not. This thesis offers a critical review of former work relating to ICT and hospitals, ...
    • Decoding GSM 

      Glendrange, Magnus; Hove, Kristian; Hvideberg, Espen (Master thesis, 2010)
      We have participated in the creation of almost two terabytes of tables aimed at cracking A5/1, the most common ciphering algorithm used in GSM. Given 114-bit of known plaintext, we are able to recover the session key with ...
    • Detecting Identity Thefts In Open 802.11e Enabled Wireless Networks 

      Holgernes, Eirik (Master thesis, 2010)
      Open wireless networks are commonly deployed as a result of easy access, user-friendliness, as well as easy deployment and maintance. These networks do not implement strong security features, and clients are prone to a ...
    • End-to-End Data Protection of SMS Messages 

      Øztarman, Jo Mehmet Sollihagen (Master thesis, 2011)
      Short Message Service (SMS) has become a very commonly used service. It does not only work as a substitute for voice telephony, but is also used for automated services. Some of these service are related to security issues ...
    • Increasing Identity Governance when using OpenID: Hosting an OpenID Identity Provider on a smartphone 

      Stien, Eirik (Master thesis, 2011)
      In the area of identity management OpenID is an identity system allowing users to log in to OpenID-enabled web sites by proving ownership of an OpenID Identifier by authenticating with its controlling OpenID Identity ...
    • Investigating the use of smartphones in the context of home networks 

      Gundersen, Henrik; Mafole, Prosper (Master thesis, 2010)
      The focus in this thesis is to investigate how smartphones on the market today can be used in the context of home networks. The latest generation of these devices has powerful hardware and software which makes them useful ...
    • Java Implementation and Performance Analysis of 14 SHA-3 Hash Functions on a Constrained Device 

      Knutsen, Mats; Martinsen, Kim-André (Master thesis, 2010)
      Several of the widely used cryptographic hash functions in use today are under attack. With the need to maintain a certain level of security, NIST is in the process of selecting new cryptographic hash function(s). Through ...
    • Market for the Sales of Wireless Broadband in Trondheim 

      Ahmed, Awais Ejaz (Master thesis, 2010)
      Wireless Trondheim is today mainly a service for nomadic and mobile broadband in other words, for use outside the home. The major goal of this study was to examine the market potential and the ability to use wireless ...
    • Privacy Policies for Location-Aware Social Network Services 

      Hjulstad, Ingrid (Master thesis, 2011)
      The combination of location-awareness and social networks has introduced systems containing an increased amount of protection-worthy personal information, creating the need for improved privacy control from a user point ...
    • Privacy services for mobile devices 

      Bø, Solvår; Pedersen, Stian Rene (Master thesis, 2011)
      Recent studies have shown that privacy on mobile devices is not properly ensured. Due to a heavy increase of smartphones in the market, in addition to a variety of third-party applications, a demand for improved solutions ...
    • Real-Time End-User Service Composition Using Google Wave 

      Halvorsen, Espen Herseth (Master thesis, 2010)
      This thesis explores Wave, a brand new communication and collaboration platform, from the perspective of end user service composition. A description of the different frameworks that are available and a study of how these ...
    • Skjult IP-kommunikasjon basert på Domain Name System (DNS) 

      Karstensen, Lasse (Master thesis, 2010)
      I denne rapporten undersøkes det om det er mulig å detektere IP-over-DNS -trafikk gjennom en navnetjener automatisk. Bakgrunn for oppgavevalget var et utsagn av Nussbaum m.fl. som sa at eneste mulighet en systemadministrator ...
    • Visualizing Spatial and Temporal Dynamics of a Class of IRC-Based Botnets 

      Hegna, Andreas (Master thesis, 2010)
      Botnets are a serious threat to the security of personal computers, businesses and even countries. They can launch attacks on remote systems and infrastructure, perform espionage and once installed they essentially hand ...