Recent Submissions

  • Congestion Control for WebRTC Services 

    Sørlie, Maria (Master thesis, 2017)
    Multimedia applications are increasing in popularity and using a big part of the Internet traffic. Web Real-Time Communication (WebRTC) is new technology which allows peer-to-peer communication in the browsers without any ...
  • Research on Development and Evaluation of WebRTC Signaling based on XMPP 

    Fan, Chun (Master thesis, 2017)
    Web is becoming more and more popular. Web Real-time Communication (WebRTC), as one of the new technologies based on Web, makes real-time communication easy to be used through the Web. However, WebRTC is not a standardization ...
  • Evaluation of SDN in Small Wireless-capable and Resource-constrained Devices 

    Beyene, Million Aregawi (Master thesis, 2017)
    Software Defined Networking (SDN) has recently emerged as the promising network architecture paradigm that is believed to revolutionize the networking world by making it more intelligent, flexible and programmable. SDN has ...
  • Memory access patterns for malware detection 

    Banin, Sergii; Shalaginov, Andrii; Franke, Katrin (Journal article; Peer reviewed, 2016)
    Malware brings significant threats to modern digitized society. Malware developers put in significant efforts to evade detection and remain unnoticed on victims' computers despite a number of malware detection techniques. ...
  • Resilience of Infrastructure Networks Byzantine Consensus, Interdependencies, and Optimisation in Sparse Networks 

    Weldehawaryat, Goitom Kahsay (Doctoral theses at NTNU;2017:80, Doctoral thesis, 2017)
    The growing dependence on critical infrastructure systems demands highly available systems that provide secure, resilient, and efficient services, even in the presence of malicious attacks. This thesis investigates the ...
  • Attacking Message Authentication Codes in EFC Using Rainbow Tables 

    Sandvold, Sverre Turter (Master thesis, 2017)
    Electronic Fee Collection (EFC) is a system for collecting fee from cars electronically. EFC contains two main components, an On-board Unit (OBU) and a Roadside Equipment (RSE). Dedicated Short-Range Communications (DSRC) ...
  • Security Risk Assessment in Software Development Projects 

    Svendsen, Heidi (Master thesis, 2017)
    Software security is increasing in importance, linearly with vulnerabilities caused by software flaws. It is not possible to spend all the project s resources on software security. To spend the resources given to security ...
  • Trust Management in Fog Computing 

    Dybedokken, Tuva Selstad (Master thesis, 2017)
    With the rise of fog computing, computation is moved away from a purely centralized approach. In the centralized approach devices have direct contact with the cloud servers. In fog computing allows for processing data along ...
  • Internet of Things - Cybersecurity at Home 

    Bjørnhaug, Tormod (Master thesis, 2017)
    IoT enheter har flere ganger blitt bevist å mangle skikkelige sikkerhetsmekanismer. Forbrukere er ofte ikke klar over hvordan farene slike enheter påvirker deres privatliv og sikkerhet. Denne oppgaven utfordrer problemet ...
  • Easy 4G/LTE IMSI Catchers for Non-Programmers 

    Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2017)
    IMSI Catchers are tracking devices that break the privacy of the subscribers of mobile access networks, with disruptive effects to both the communication services and the trust and credibility of mobile network operators. ...
  • Modeling Adaptive Security in IoT Driven eHealth 

    Waqas, Aman (Chapter, 2013)
  • EDAS: An evaluation prototype for autonomic event-driven adaptive security in the internet of things 

    Aman, Waqas; Snekkenes, Einar (Journal article; Peer reviewed, 2015)
    In Internet of Things (IoT), the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing ...
  • User Modeling Validation Over the Security Awareness of Digital Natives 

    Gkioulos, Vasileios; Wangen, Gaute; Katsikas, Sokratis (Journal article; Peer reviewed, 2017)
    Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices ...
  • Cryptographic access control for big data platforms 

    Viken, Christoffer (Master thesis, 2017)
    This thesis has looked into the performance of select cryptographic algorithms and compared them to each other in the context of big data. The algorithms compared are Advanced Encryption Standard (AES), RSA, and a ...
  • Security analysis of Docker containers in a production environment 

    Kabbe, Jon-Anders (Master thesis, 2017)
    Container technology for hosting applications on the web is gaining traction as the preferred mode of deployment. Major actors in the IT industry are transforming their infrastructure into smaller services and are using ...
  • Comparative Analysis of Bitcoin and Ethereum 

    Rudlang, Marit (Master thesis, 2017)
    Since Bitcoin was launched in 2009, several new cryptocurrencies have been initiated with variations to Bitcoin's original design. Although Bitcoin still remains the most prominent actor in the market, some technical ...
  • Performance analysis and enhancement of the iSHAKE algorithm 

    Perez Crespo, Jaime (Master thesis, 2017)
    In the era of the Big Data, immense amounts of data are being generated and processed every second. Research facilities like the European Large Hadron Collider (LHC) in Geneva generate massive amounts of information every ...
  • The Risks of Marine Cloud Computing 

    Eriksen, Adrian Alexander (Master thesis, 2017)
    The maritime industry has an increasing reliance on information and communication technology (ICT) systems to ensure efficient operations, moving their threat picture into the cyber domain. Meanwhile, cloud computing has ...
  • Simulating secure cloud storage schemes 

    de la Mata, Jorge Campos (Master thesis, 2017)
    Cloud storage services have become a popular solution to store large amounts of data generated by users and enterprises, because they provide an affordable and practical solution. In order to gain efficiency and reduce ...
  • Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking 

    Galteland, Herman; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2017)
    The cMix scheme was proposed by Chaum et al. in 2016 as the first practical set of cryptographic protocols that offer sender-recipient unlinkability at scale. The claim was that the cMix is secure unless all nodes collude. ...

View more