Now showing items 1-20 of 1439

    • 

      Fredrik Morten Sætran (Master thesis, 2019)
      The more sophisticated tools and methods used by attackers has forced the computer security industry to look for improved security controls. Malicious software is often used as a tool for frequent and costly computer ...
    • 0-RTT Key Exchange with Full Forward Secrecy 

      Günther, Felix; Hale, Britta; Jager, Tibor; Lauer, Sebastian (Chapter, 2017)
      Reducing latency overhead while maintaining critical security guarantees like forward secrecy has become a major design goal for key exchange (KE) protocols, both in academia and industry. Of particular interest in this ...
    • 2) Cloud Radio Access Networks (C-RAN) and optical Mobile backhaul and fronthaul 

      Hailu, Dawit Hadush (Master thesis, 2016)
      Increasing mobile data traffic due to the rise of both smartphones and tablets has led to high-capacity demand of mobile data network. To meet the ever-growing capacity demand and reduce the cost of mobile network components, ...
    • 4G Nett: En teknisk og økonomisk analyse 

      Neuenkirchen, Jan Henrik (Master thesis, 2011)
      Denne masteroppgaven har tatt for seg ulik tematikk tilknyttet fjerde generasjons (4G) nettverk. Temaene som har blitt behandlet er både av teknisk og økonomisk art. I starten av oppgaven har de tidligere nettverkene, fra ...
    • A Basic Result on the Superposition of Arrival Processes in Deterministic Networks 

      Jiang, Yuming (Chapter, 2018)
      Time-Sensitive Networking (TSN) and Deterministic Networking (DetNet) are emerging standards to enable deterministic, delay-critical communication in such networks. This naturally (re-)calls attention to the network calculus ...
    • Academic Dissemination and Exploitation of a Clean-slate Internetworking Architecture:: The Publish-Subscribe Internet Routing Paradigm 

      Ain, Mark (Master thesis, 2010)
      This thesis is about disseminating and exploiting a clean-slate internetworking architecture through advanced academic courses. We design, execute, and report on the results of an academic course-based engagement and ...
    • A Case Study of a National Open Access Network in Norway 

      Thygesen, Ørjan Bøe (Master thesis, 2015)
      Due to changes in the problem description during the work on this thesis, a more precise title to this thesis would be: "A Comparative Study of The Internet Access Markets in Norway and Sweden - Open Access Networks versus ...
    • A Case Study of Usability Design in Ocean for Petrel Development at Schlumberger Information Solutions. 

      Flataker, Linn Veronica (Master thesis, 2009)
      AbstractSchlumberger is a service oilfield provider company which also develops their own software for their clients. They are in the special situation where they have developers who develop an API, which is then used to ...
    • Access Control in Critical Infrastructure Control Rooms using Continuous Authentication and Face Recognition 

      Dragerengen, Kristian (Master thesis, 2018)
      Access control solutions in critical infrastructure control rooms do not support needs for availability and traceability. Most solutions rely on usernames and passwords that are used on multiple accounts on different ...
    • Access Control in Home Network Systems 

      Anda, Kjell Erik Aas (Master thesis, 2009)
      In this thesis we examine the possibility to create an Access Control Service, offering Authentication, authorization and confidentiality to support users with remote access to a Home network system. We study different ...
    • Access Control in Multi-Thousand-Machine Datacenters 

      Garnes, Håvard Husevåg (Master thesis, 2008)
      Large data centers are used for large-scale high-performance tasks that often includes processing and handling sensitive information. It is therefore important to have access control systems that are able to function in ...
    • Access control of NUTS uplink 

      Prasai, Sandesh (Master thesis, 2012)
      Access control of NUTS uplinkWe will focus in the authentication and integrity part in this thesis.
    • Access Management in Backbones of SDN 

      Johansen, Janita Marielle (Master thesis, 2019)
      Selv om aksesskontroll innenfor Software Defined Networking (SDN) allerede har blitt forsket på, har ingen av de tidligere undersøkelsens vurdert nettverk med flere domener og samarbeidende aksesskontroll mellom dem. Denne ...
    • Access Network Selection and Optimized Handovers in Heterogeneous Wireless Networks 

      Karam, Fazal Wahab (Doctoral Theses at NTNU, 1503-8181; 2013:90, Doctoral thesis, 2013)
      In recent years there has been rapid growth in deployment and usage of real-time network applications such as Voice-over-IP, video calls/video conferencing, live network seminars, and networked gaming. The increase in the ...
    • Achieving dependability in software-defined networking - a perspective 

      Helvik, Bjarne Emil; Heegaard, Poul Einar; Mendiratta, Veena (Chapter; Conference object; Peer reviewed, 2015)
      In this paper we take a closer look at the operationof software defined networking (SDN) in intra-domain networks.The focus is on the dependability issues related to interworking ofSDN controllers, network OS (NOS), and ...
    • A Comparison between Business Process Management and Information Security Management 

      Wangen, Gaute; Snekkenes, Einar (Chapter, 2014)
      Information Security Standards such as NIST SP 800-39 and ISO/IEC 27005:2011 are turning their scope towards business process security. And rightly so, as introducing an information security control into a business-processing ...
    • A Computational Forensic Approach to the Analysis of Questioned Document Fragments 

      Chanda, Sukalpa (Doktorgradsavhandlinger ved Høgskolen i Gjøvik;1/2015, Doctoral thesis, 2015-05-29)
      Fragments of documents are common subjects in forensic analysis of questioned documents. Forensic analysis of torn document is more challenging owing to sparse data content; for example, a document fragment might consist ...
    • A connectionless multicast protocol for MANETs 

      Thi Minh Do, Viet; Landmark, Lars; Kure, Øivind (2012 International Conference on Telecommunications and Multimedia (TEMU);, Chapter; Conference object; Peer reviewed; Journal article, 2012)
      In this paper, the connectionless multicast routing MCOM (Multipoint relay Connectionless Multicast) is introduced for mobile Ad hoc networks. MCOM adapts over a wide ranges of density of group members. It appears as unicast ...
    • A Constructive Approach to Support the Design of State Machines 

      Gisnås, Øystein (Master thesis, 2006)
      The components of telecommunication systems can be described by state machines that communicate by sending messages asynchronously. It is difficult to keep a component consistent with the other components it is connected ...