Now showing items 1-20 of 134

    • A connectionless multicast protocol for MANETs 

      Thi Minh Do, Viet; Landmark, Lars; Kure, Øivind (2012 International Conference on Telecommunications and Multimedia (TEMU);, Chapter; Conference object; Peer reviewed; Journal article, 2012)
      In this paper, the connectionless multicast routing MCOM (Multipoint relay Connectionless Multicast) is introduced for mobile Ad hoc networks. MCOM adapts over a wide ranges of density of group members. It appears as unicast ...
    • A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework 

      Wangen, Gaute; Hallstensen, Christoffer V; Snekkenes, Einar Arthur (Journal article; Peer reviewed, 2017)
      In general, an information security risk assessment (ISRA) method produces risk estimates, where risk is the product of the probability of occurrence of an event and the associated consequences for the given organization. ...
    • Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings 

      Wold, Knut; Tan, Chik How (Peer reviewed; Journal article, 2009)
      A true random number generator (TRNG) is an important component in cryptographic systems. Designing a fast and secure TRNG in an FPGA is a challenging task. In this paper, we analyze the TRNG designed by Sunar et al. (2007) ...
    • Analysis of the effect of InfoRanking on content pollution in peer-to-peer systems 

      Zhang, Peiqing; Fotiou, Nikos; Helvik, Bjarne Emil; Marias, Giannis F.; Polyzos, George C. (Journal article; Peer reviewed, 2014)
      Content pollution is one of the most common attacks against peer-to-peer file-sharing systems. As such, systems are usually open to users, and the deployed security mechanisms merely examine the sanity of the downloaded ...
    • An Initial Insight Into InfoSec Risk Management Practices 

      Wangen, Gaute (Journal article; Peer reviewed, 2015)
      Much of the debate surrounding risk management in information security (InfoSec) has been at the academic level, and how practitioners view predominant issues is an important element often left unexplored. Thus, this article ...
    • Approximate search with constraints on indels with application in SPAM filtering 

      Chitrakar, Ambika Shrestha; Petrovic, Slobodan (Journal article; Peer reviewed, 2015)
      Finding distorted occurrences of search pattern(s) in the search string by applying constraints on elementary edit operations (indels (insertions/deletions) and substitutions) is a new category of the approximate string ...
    • A Statistical Property of Wireless Channel Capacity: Theory and Application 

      Sun, Fengyou; Jiang, Yuming (Journal article; Peer reviewed, 2017)
      This paper presents a set of new results on wireless channel capacity by exploring its special characteristics. An appealing discovery is that the instantaneous and cumulative capacity distributions of typical fading ...
    • A Survey of QoS Multicast in Ad Hoc Networks 

      Thi Minh Do, Viet; Landmark, Lars; Kure, Øivind (Journal article; Peer reviewed, 2010-09-14)
      This survey on Quality of Service (QoS) in multicast ad hoc networks uses a framework based on the mechanisms in three important elements: resource estimations, multicast tree/mesh administration, and multicast routing. ...
    • Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking 

      Galteland, Herman; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2017)
      The cMix scheme was proposed by Chaum et al. in 2016 as the first practical set of cryptographic protocols that offer sender-recipient unlinkability at scale. The claim was that the cMix is secure unless all nodes collude. ...
    • Automatic Redeye Correction Algorithm with Multilevel Eye Confirmation 

      George, Sony; Hardeberg, Jon Yngve; George, Tomson G.; Nampoori, V. P. N. (Journal article; Peer reviewed, 2010)
      Redeye is a well-known problem in portrait photography. This effect is caused by the light entering the subject's eye through the pupil and reflection from the retina back to the imaging sensor. Many of the existing redeye ...
    • Availability communication: Requirements for an awareness system to support nurses' handling of nurse calls 

      Klemets, Joakim Henrik M; Toussaint, Pieter Jelle (Journal article; Peer reviewed, 2015)
      The recent development of mobile technologies allows nurses to receive different types of requests anywhere. However, the interruptions generated by these devices often presents a challenge for nurses in their daily work ...
    • A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols 

      Tsay, Joe-Kai; Mjølsnes, Stig Frode (Journal article; Peer reviewed, 2012)
    • Can no-reference image quality metrics assess visible wavelength iris sample quality? 

      Liu, Xinwei; Pedersen, Marius; Charrier, Christophe; Bours, Patrick (Journal article; Peer reviewed, 2017)
      The overall performance of iris recognition systems is affected by the quality of acquired iris sample images. Due to the development of imaging technologies, visible wavelength iris recognition gained a lot of attention ...
    • Challenges in IT Security Preparedness Exercises: A Case Study 

      Bartnes, Maria; Moe, Nils Brede (Journal article; Peer reviewed, 2016)
      The electric power industry is currently implementing major technological changes in order to achieve the goal of smart grids. However, these changes are expected to increase the susceptibility of the industry to IT security ...
    • Characterizing the response of charge-couple device digital color cameras 

      Slavkovikj, Viktor; Hardeberg, Jon Yngve; Eichhorn, Alexander (Journal article; Peer reviewed, 2012)
      The advance and rapid development of electronic imaging technology has lead the way to production of imaging sensors capable of acquiring good quality digital images with a high resolution. At the same time the cost and ...
    • Clustering Document Fragments using Background Color and Texture Information 

      Chanda, Sukalpa; Franke, Katrin; Pal, Umapada (Journal article; Peer reviewed, 2012)
      Forensic analysis of questioned documents sometimes can be extensively data intensive. A forensic expert might need to analyze a heap of document fragments and in such cases to ensure reliability he/she should focus ...
    • Collecting fingerprints for recognition using mobile phone cameras 

      Yang, Bian; Li, Xue; Busch, Christoph (Journal article; Peer reviewed, 2012)
      We present in this paper a sample quality control approach for the case using a mobile phone’s camera as a fingerprint sensor for fingerprint recognition. Our approach directly estimates the maximum ridge frequency ...
    • Compact Implementation of BLUE MIDNIGHT WISH-256 Hash Function on Xilinx FPGA Platform 

      El Hadedy, Mohamed; Gligoroski, Danilo; Knapskog, Svein J.; Margala, Martin (Journal article; Peer reviewed, 2010)
    • Comparison of eye tracking devices used on printed images 

      Komínková, Barbora; Pedersen, Marius; Hardeberg, Jon Yngve; Kaplanová, Marie (Proceedings of SPIE;6806, Journal article; Peer reviewed, 2008)
      Eye tracking as a quantitative method for collecting eye movement data, requires the accurate knowledge of the eye position, where eye movements can provide indirect evidence about what the subject sees. In this study two ...
    • Compensating for non-uniform screens in projection display systems 

      Renani, Siavash Asgari; Tsukada, Masato; Hardeberg, Jon Yngve (Proceedings of SPIE;7241, Journal article; Peer reviewed, 2009)
      In this paper the performance of screen compensation based on previous work by Nayar et al. and Ashdown et al. and five different camera characterization methods are evaluated. Traditionally, colorimetric characterization ...