Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1-20 av 1558
-
0-RTT Key Exchange with Full Forward Secrecy
(Chapter, 2017)Reducing latency overhead while maintaining critical security guarantees like forward secrecy has become a major design goal for key exchange (KE) protocols, both in academia and industry. Of particular interest in this ... -
2) Cloud Radio Access Networks (C-RAN) and optical Mobile backhaul and fronthaul
(Master thesis, 2016)Increasing mobile data traffic due to the rise of both smartphones and tablets has led to high-capacity demand of mobile data network. To meet the ever-growing capacity demand and reduce the cost of mobile network components, ... -
4G Nett: En teknisk og økonomisk analyse
(Master thesis, 2011)Denne masteroppgaven har tatt for seg ulik tematikk tilknyttet fjerde generasjons (4G) nettverk. Temaene som har blitt behandlet er både av teknisk og økonomisk art. I starten av oppgaven har de tidligere nettverkene, fra ... -
5G Network Slicing as an Enabler for Smart Distribution Grid Operations
(Journal article; Peer reviewed, 2019)The power distribution grid has to undergo substantial modifications in order to meet the future electricity needs. The increased flexibility in power consumption, local production and storage insist on smarter supervisory ... -
A Basic Result on the Superposition of Arrival Processes in Deterministic Networks
(Chapter, 2018)Time-Sensitive Networking (TSN) and Deterministic Networking (DetNet) are emerging standards to enable deterministic, delay-critical communication in such networks. This naturally (re-)calls attention to the network calculus ... -
A Case Study of a National Open Access Network in Norway
(Master thesis, 2015)Due to changes in the problem description during the work on this thesis, a more precise title to this thesis would be: "A Comparative Study of The Internet Access Markets in Norway and Sweden - Open Access Networks versus ... -
A Case Study of Usability Design in Ocean for Petrel Development at Schlumberger Information Solutions.
(Master thesis, 2009)AbstractSchlumberger is a service oilfield provider company which also develops their own software for their clients. They are in the special situation where they have developers who develop an API, which is then used to ... -
A Comparison between Business Process Management and Information Security Management
(Chapter, 2014)Information Security Standards such as NIST SP 800-39 and ISO/IEC 27005:2011 are turning their scope towards business process security. And rightly so, as introducing an information security control into a business-processing ... -
A Computational Forensic Approach to the Analysis of Questioned Document Fragments
(Doktorgradsavhandlinger ved Høgskolen i Gjøvik;1/2015, Doctoral thesis, 2015-05-29)Fragments of documents are common subjects in forensic analysis of questioned documents. Forensic analysis of torn document is more challenging owing to sparse data content; for example, a document fragment might consist ... -
A connectionless multicast protocol for MANETs
(2012 International Conference on Telecommunications and Multimedia (TEMU);, Chapter; Conference object; Peer reviewed; Journal article, 2012)In this paper, the connectionless multicast routing MCOM (Multipoint relay Connectionless Multicast) is introduced for mobile Ad hoc networks. MCOM adapts over a wide ranges of density of group members. It appears as unicast ... -
A Constructive Approach to Support the Design of State Machines
(Master thesis, 2006)The components of telecommunication systems can be described by state machines that communicate by sending messages asynchronously. It is difficult to keep a component consistent with the other components it is connected ... -
A Context-Aware System to Communicate Urgency Cues to Health Care Workers
(Master thesis, 2014)When nurses receive calls on their mobile phones, they need to decide whether to engage in the callor not. Several contextual factors play a role in making this decision. For example, if a nurse is busywith another patient ... -
A Control System Providing a Dynamic Overview of Emergency Situations at Oil and Gas Processing Plants
(Master thesis, 2009)Oil and gas processing plants handle very large volumes of gases and liquids, many of which are both flammable and poisonous. Combined with the high pressures often involved as part of the processing, an accident has the ... -
A Data Dissemination Protocol for Vehicles with Temporary Cellular Network Inaccessibility
(Chapter, 2019)The cellular network coverage in sparsely populated and mountainous areas is often patchy. That can be a significant impediment for services based on connections between vehicles and their environment. In this paper, we ... -
A Demonstration on Service Compositions based on Natural Language Request and User Contexts
(Master thesis, 2008)The significant growth in mobile markets exposes business niches. A number of heterogeneous services have been offered to end users by several service providers. The end users can fully benefit from wide varieties of ... -
A diagrammatic notation for modeling access control in tree-based data structures
(Doctoral Theses at NTNU, 1503-8181; 2008:142, Doctoral thesis, 2008)This thesis describe two graphical modeling languages that can be used for specifying the access control setup in most systems that store information in a tree based structure. The Tree-based Access control Modeling ... -
A Fault-Tolerant and Consistent SDN Controller
(Chapter; Conference object; Peer reviewed, 2016)Software-Defined Networking (SDN) is a new paradigm that promises to enhance network flexibility and innovation. However, operators need to thoroughly assess its advantages and threats before they can implement it. Robustness ... -
A Flexible Way to Dynamically Visualize Spatiotemporal Data in a Geographic Information System
(Master thesis, 2018)In this project thesis, with the development of the dynamic system, we have shown that it is possible to visualize spatiotemporal data flexibly in real-time and which can also be examined from anywhere. The achieved system ...