• Hadoop, and Its Mechanisms for Reliable Storage 

      Midthaug, Ingvild Hovdelien (Master thesis, 2018)
      Nowadays the global amount of digital data increases rapidly. Internet-connected devices generate massive amounts of data through various interactions such as digital communication and file sharing. In a world surrounded ...
    • Handle Firewall Security Policy by Graphical Traffic Matrix: Grouping of Firewall Rules 

      Kaspersen, Arne Yngve (Master thesis, 2007)
      Organizations today are in trust of the diversity the Internet gives. With a connection they re able to do end-to-end communication with customers and partners everywhere in the world, and because the diversity of Internet, ...
    • Handover between Wireless Networks for Medical Applications 

      Agostini, Michele (Master thesis, 2016)
      This project takes inspiration from the medical area and focuses on how the Internet of Things can provide improvements. The idea is to build a system that leaves the patients move freely in the hospital and in the meanwhile ...
    • Hash Functions and Gröbner Bases Cryptanalysis 

      Ødegård, Rune Steinsmo (Doktoravhandlinger ved NTNU, 1503-8181; 2012:111, Doctoral thesis, 2012)
      Hash functions are being used as building blocks in such diverse primitives as commitment schemes, message authentication codes and digital signatures. These primitives have important applications by themselves, and they ...
    • Hendelseshåndtering i små og mellomstore bedrifter 

      Sand, Lars Arne; Wangen, Gaute Bjørklund; Frogner, Anders Sand (Bachelor thesis, 2010)
      Hendelseshåndtering er et spennende og viktig tema innenfor informasjonssikkerhet. Det finnes en del faglitteratur om emnet, men kunnskapen om hvordan hendelseshåndtering anvendes er ikke godt kartlagt. Det var derfor ...
    • HIKOS - Highly Secure, Intelligent Software Copy-Protection 

      Veseli, Fatbardh (Master thesis, 2011)
      Software piracy, which includes reproducing and distributing software products illegaly and without authorization, continues to cause financial losses to software vendors. Dongles for hardware protection have been present ...
    • Hip movement based authentication: how will imitation affect the results? 

      Buvarp, Tor Erik (Master thesis, 2006)
      NORSK: Denne oppgaven vil se på en metode innen biometrisk autentisering som er ganske ny innen denne type forskning. Metoden tar for seg autentisering av en person ved å registrere hofte bevegelsen i løpet av ordinær ...
    • How to make money on mobile applications 

      Tveten, Thomas Moltke-H (Master thesis, 2014)
      The number of mobile applications grows exponential fast with 1,000 new applications published each day, and 1 million already available. The competition among applications is fierce, but the applications that become popular ...
    • Human Computable Passwords - Design and Analysis. 

      Kofoed, Anders (Master thesis, 2015)
      Password management is a major issue in the Internet centric world. This project presents the human computable password management scheme by Blocki et al., which makes it possible for human users to calculate passwords ...
    • Hybrid Peer-to-Peer Solution for MMORPGs 

      Aasen, Frode Voll; Johannessen, Tom-Christian Bjørlo (Master thesis, 2009)
      This thesis provides an introduction to the MMORPG genre, and the challenges of engineering a networking system supporting these games, as well as the state of the art titles that exist on the market today. Further it ...
    • Hyperbolic geometry for colour metrics 

      Farup, Ivar (Journal article; Peer reviewed, 2014)
      It is well established from both colour difference and colour order perpectives that the colour space cannot be Euclidean. In spite of this, most colour spaces still in use today are Euclidean, and the best Euclidean colour ...
    • Identification of malicious behavior patterns for software 

      Khan, Saad Usman (Master thesis, 2014)
      Over the years malware has increased in number and became increasingly harmful. Traditionally, anti-virus suites are used to protect the computers from various forms of malware. In recent years a new technique called ...
    • Identifying TLS abnormalities in Tor 

      Granerud, Anders Olaus (Master thesis, 2010)
      ENGELSK: This master thesis will examine Tor, which is an open-source anonymizing service used on the Internet. Tor gives the user an anonymous connection to the Internet in real-time. The research on Tor has been ...
    • Identitetstyveri og identitetssvindel: konsekvenser i offentlig sektor 

      Ljusic, Dejan (Master thesis, 2011)
      Identitetsstyveri er i dag en av de sterkest voksende formene for kriminalitet i verden. I USA utsettes omslag 9 millioner mennesker for ID tyveri hvert år FTC1[1]. Leif T Aanensen fra Datatilsynet[2] hevder at hver nordmann ...
    • Identity Management in a Fixed-Mobile Convergent Environment 

      Lillehovde, Lars Jørgen (Master thesis, 2010)
      The unification of fixed and mobile telecommunication networks could potentially lead to new and better services for the customers and allow telecommunication operators to re-use existing network infrastructure and lower ...
    • Identity Management in a Fixed Mobile convergent IMS environment 

      Nguyen, Trung Kien (Master thesis, 2008)
      Today, there are still different technologies used in fixed and mobile networks environment such as cellular technologies (GSM, UMTS, 3G, etc.), wireless network technology like WLAN, wired network technology like ADSL, ...
    • Identity Management in M2M Networks 

      Butkus, Pranas (Master thesis, 2014)
      Evolving communication technologies stimulate a rapid growth in utilisation of communication-capable devices and therefore amount of transmitted data. This imposes new requirements for automatic device and data management ...
    • Identity management on VANETS 

      Jemberu, Ephraim Alemneh (Master thesis, 2012)
      Vehicular ad-hoc networks (VANETs) have envisioned various applications that substantially improve traffic safety and efficiency along the roads and highways. There are on-going projects both in academia and industry to ...
    • Identity Management with Petname Systems 

      Ferdous, Md. Sadek (Master thesis, 2009)
      In the first part of the thesis, we have focused on providing a brief overview of Petname Systems starting from the introductory concept of Entity, Identity and Identity Management with a brief description on different IdM ...
    • ID-fraud mitigation - A proposal of an EoI evaluation system operationalizing common objectives in ID proofing 

      Toftegaard, Øyvind Anders Arntzen (Master thesis, 2017)
      ID fraud is a serious problem around the world which can result in crimes like economic fraud, human trafficking and terrorism. Many Norwegian organizations has pointed out challenges in performing ID control. This work ...