Now showing items 455-474 of 1129

    • Identification of malicious behavior patterns for software 

      Khan, Saad Usman (Master thesis, 2014)
      Over the years malware has increased in number and became increasingly harmful. Traditionally, anti-virus suites are used to protect the computers from various forms of malware. In recent years a new technique called ...
    • Identifying TLS abnormalities in Tor 

      Granerud, Anders Olaus (Master thesis, 2010)
      ENGELSK: This master thesis will examine Tor, which is an open-source anonymizing service used on the Internet. Tor gives the user an anonymous connection to the Internet in real-time. The research on Tor has been ...
    • Identitetstyveri og identitetssvindel: konsekvenser i offentlig sektor 

      Ljusic, Dejan (Master thesis, 2011)
      Identitetsstyveri er i dag en av de sterkest voksende formene for kriminalitet i verden. I USA utsettes omslag 9 millioner mennesker for ID tyveri hvert år FTC1[1]. Leif T Aanensen fra Datatilsynet[2] hevder at hver nordmann ...
    • Identity Management in a Fixed-Mobile Convergent Environment 

      Lillehovde, Lars Jørgen (Master thesis, 2010)
      The unification of fixed and mobile telecommunication networks could potentially lead to new and better services for the customers and allow telecommunication operators to re-use existing network infrastructure and lower ...
    • Identity Management in a Fixed Mobile convergent IMS environment 

      Nguyen, Trung Kien (Master thesis, 2008)
      Today, there are still different technologies used in fixed and mobile networks environment such as cellular technologies (GSM, UMTS, 3G, etc.), wireless network technology like WLAN, wired network technology like ADSL, ...
    • Identity Management in M2M Networks 

      Butkus, Pranas (Master thesis, 2014)
      Evolving communication technologies stimulate a rapid growth in utilisation of communication-capable devices and therefore amount of transmitted data. This imposes new requirements for automatic device and data management ...
    • Identity management on VANETS 

      Jemberu, Ephraim Alemneh (Master thesis, 2012)
      Vehicular ad-hoc networks (VANETs) have envisioned various applications that substantially improve traffic safety and efficiency along the roads and highways. There are on-going projects both in academia and industry to ...
    • Identity Management with Petname Systems 

      Ferdous, Md. Sadek (Master thesis, 2009)
      In the first part of the thesis, we have focused on providing a brief overview of Petname Systems starting from the introductory concept of Entity, Identity and Identity Management with a brief description on different IdM ...
    • ID-fraud mitigation - A proposal of an EoI evaluation system operationalizing common objectives in ID proofing 

      Toftegaard, Øyvind Anders Arntzen (Master thesis, 2017)
      ID fraud is a serious problem around the world which can result in crimes like economic fraud, human trafficking and terrorism. Many Norwegian organizations has pointed out challenges in performing ID control. This work ...
    • Idol Show in China 

      Draper Gil, Gerard (Master thesis, 2006)
      Our objective is to test the performance of a real SMS Processing System. We will work with Boost Communications, a norwegian company that is developing a SMS Processing System to sell interactive SMS solutions. With our ...
    • IDSanity: a centralized and modular framework for managing IDPS and WAF rulesets 

      Ingdal, Tommy Berge; Thoresen, Halvor Mydske; Ruldolfsson, Victor (Bachelor thesis, 2015)
      In a big and complex network of IDPS and/or WAF nodes it may become time-consuming and complicated to maintain and keep control of all the different rule sets which are active at a given time. This can potentially lead to ...
    • Image quality metrics for the evaluation of print quality 

      Pedersen, Marius; Bonnier, Nicolas; Hardeberg, Jon Yngve; Albregtsen, Fritz (Proceedings of SPIE;7867, Journal article; Peer reviewed, 2011)
      Image quality metrics have become more and more popular in the image processing community. However, so far, no one has been able to define an image quality metric well correlated with the percept for overall image quality. ...
    • Impact of Conversation Task When Testing QoE in WebRTC 

      Haga, Marie (Master thesis, 2018)
      Video conferencing was previously associated with dedicated hardware and professional conferencing systems. The last years applications and services enabling Real-Time Communication with no need for additional software ...
    • Impact of SDN Controllers Deployment on Network Availability 

      Nencioni, Gianfranco; Helvik, Bjarne Emil; Gonzalez, Andres Javier; Heegaard, Poul Einar; Kamisinski, Andrzej (Research report, 2016)
      Software-defined networking (SDN) promises to improve the programmability and flexibility of networks, but it may bring also new challenges that need to be explored. The purpose of this technical report is to assess how ...
    • Implementation of public key algorithms in CUDA 

      Wu, Hao (Master thesis, 2010)
      In the field of cryptography, public key algorithms are widely known to be slower than symmetric key alternatives for the reason of their basis in modular arithmetic. The modular arithmetic in e.g. RSA and Diffie Hellman ...
    • Implementation of the DEMOS simulation model into NS-3 

      Larsen, Morten Andrè (Master thesis, 2013)
      Simulators are software which allows the creation of models of real systemsand situations. They allow research and development projects to try outtheories and potential solutions on products before they are completed.?Discrete ...
    • IMPLEMENTING ALGORITHMSON FPGA PLATFORMS 

      Aly, Mohamed Ezzat El-Hadedy (Doktoravhandlinger ved NTNU, 1503-8181; 2012:34, Doctoral thesis, 2012)
      This thesis proposes a hardware implementation of multivariate quadratic quasigroup (MQQ) public key cryptosystem that achieves decryption throughput of 399 Mbps on a Xilinx Virtex-5 field programable gate array (FPGA), ...
    • Implementing and Simulating the Cross-Entropy Ant System 

      Brugge, Jonathan (Master thesis, 2010)
      The Cross-Entropy Ant System (CEAS) has been implemented in ns-3. The implementation has been validated against the latest ns-2 implementation and some extra simulations have been performed. Apart from that, experiences ...
    • Implementing a Secure Ad Hoc Network 

      Graarud, Espen Grannes (Master thesis, 2011)
      In emergency situations such as natural disasters the emergency personell shouldbe able to establish communication fast and reliably. Depending on the nature ofthe disaster one cannot rely on existing communication ...
    • Implementing modular arithmetic using OpenCL 

      Gundersen, Fredrik (Master thesis, 2010)
      Problem description: Most public key algorithms are based on modular arithmetic. The simplest, and original, implementation of the protocol uses the multiplicative group of integers modulo p, where p is prime and g is ...