Now showing items 1-20 of 140

    • A connectionless multicast protocol for MANETs 

      Thi Minh Do, Viet; Landmark, Lars; Kure, Øivind (2012 International Conference on Telecommunications and Multimedia (TEMU);, Chapter; Conference object; Peer reviewed; Journal article, 2012)
      In this paper, the connectionless multicast routing MCOM (Multipoint relay Connectionless Multicast) is introduced for mobile Ad hoc networks. MCOM adapts over a wide ranges of density of group members. It appears as unicast ...
    • A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework 

      Wangen, Gaute; Hallstensen, Christoffer V; Snekkenes, Einar Arthur (Journal article; Peer reviewed, 2017)
      In general, an information security risk assessment (ISRA) method produces risk estimates, where risk is the product of the probability of occurrence of an event and the associated consequences for the given organization. ...
    • Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings 

      Wold, Knut; Tan, Chik How (Peer reviewed; Journal article, 2009)
      A true random number generator (TRNG) is an important component in cryptographic systems. Designing a fast and secure TRNG in an FPGA is a challenging task. In this paper, we analyze the TRNG designed by Sunar et al. (2007) ...
    • Analysis of the effect of InfoRanking on content pollution in peer-to-peer systems 

      Zhang, Peiqing; Fotiou, Nikos; Helvik, Bjarne Emil; Marias, Giannis F.; Polyzos, George C. (Journal article; Peer reviewed, 2014)
      Content pollution is one of the most common attacks against peer-to-peer file-sharing systems. As such, systems are usually open to users, and the deployed security mechanisms merely examine the sanity of the downloaded ...
    • A new QoE fairness index for QoE management 

      Hossfelt, Tobias; Skorin-Kapov, Lea; Heegaard, Poul Einar; Varela, Martin (Journal article; Peer reviewed, 2018)
      The user-centric management of networks and services focuses on the Quality of Experience (QoE) as perceived by the end user. In general, the goal is to maximize (or at least ensure an acceptable) QoE, while ensuring ...
    • An Experimental Platform for QoE Studies of WebRTC-based Multi-Party Video Communication 

      Ammar, Doreid; De Moor, Katrien; Heegaard, Poul Einar (Journal article, 2018)
      Web Real-Time Communication (WebRTC) enables easy to use, no installation, in browser applications such as Google hangout and appear.in. To increase the understanding of the Quality of Experience with the use of such ...
    • An Initial Insight Into InfoSec Risk Management Practices 

      Wangen, Gaute (Journal article; Peer reviewed, 2015)
      Much of the debate surrounding risk management in information security (InfoSec) has been at the academic level, and how practitioners view predominant issues is an important element often left unexplored. Thus, this article ...
    • Approximate search with constraints on indels with application in SPAM filtering 

      Chitrakar, Ambika Shrestha; Petrovic, Slobodan (Journal article; Peer reviewed, 2015)
      Finding distorted occurrences of search pattern(s) in the search string by applying constraints on elementary edit operations (indels (insertions/deletions) and substitutions) is a new category of the approximate string ...
    • A Statistical Property of Wireless Channel Capacity: Theory and Application 

      Sun, Fengyou; Jiang, Yuming (Journal article; Peer reviewed, 2017)
      This paper presents a set of new results on wireless channel capacity by exploring its special characteristics. An appealing discovery is that the instantaneous and cumulative capacity distributions of typical fading ...
    • A Survey of QoS Multicast in Ad Hoc Networks 

      Thi Minh Do, Viet; Landmark, Lars; Kure, Øivind (Journal article; Peer reviewed, 2010-09-14)
      This survey on Quality of Service (QoS) in multicast ad hoc networks uses a framework based on the mechanisms in three important elements: resource estimations, multicast tree/mesh administration, and multicast routing. ...
    • Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking 

      Galteland, Herman; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2017)
      The cMix scheme was proposed by Chaum et al. in 2016 as the first practical set of cryptographic protocols that offer sender-recipient unlinkability at scale. The claim was that the cMix is secure unless all nodes collude. ...
    • Automatic Redeye Correction Algorithm with Multilevel Eye Confirmation 

      George, Sony; Hardeberg, Jon Yngve; George, Tomson G.; Nampoori, V. P. N. (Journal article; Peer reviewed, 2010)
      Redeye is a well-known problem in portrait photography. This effect is caused by the light entering the subject's eye through the pupil and reflection from the retina back to the imaging sensor. Many of the existing redeye ...
    • Availability communication: Requirements for an awareness system to support nurses' handling of nurse calls 

      Klemets, Joakim Henrik M; Toussaint, Pieter Jelle (Journal article; Peer reviewed, 2015)
      The recent development of mobile technologies allows nurses to receive different types of requests anywhere. However, the interruptions generated by these devices often presents a challenge for nurses in their daily work ...
    • A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols 

      Tsay, Joe-Kai; Mjølsnes, Stig Frode (Journal article; Peer reviewed, 2012)
    • Bitcoin Unchained 

      Boyd, Colin Alexander; Carr, Christopher; Boyen, Xavier; Haines, Thomas (Journal article, 2017)
      Bitcoin’s distributed ledger is an innovative way of solving the double spending problem in a decentralised system. However, it causes incompressible transaction delays and incentivises consolidation of mining power. We ...
    • Can no-reference image quality metrics assess visible wavelength iris sample quality? 

      Liu, Xinwei; Pedersen, Marius; Charrier, Christophe; Bours, Patrick (Journal article; Peer reviewed, 2017)
      The overall performance of iris recognition systems is affected by the quality of acquired iris sample images. Due to the development of imaging technologies, visible wavelength iris recognition gained a lot of attention ...
    • Challenges in IT Security Preparedness Exercises: A Case Study 

      Bartnes, Maria; Moe, Nils Brede (Journal article; Peer reviewed, 2016)
      The electric power industry is currently implementing major technological changes in order to achieve the goal of smart grids. However, these changes are expected to increase the susceptibility of the industry to IT security ...
    • Characterizing the response of charge-couple device digital color cameras 

      Slavkovikj, Viktor; Hardeberg, Jon Yngve; Eichhorn, Alexander (Journal article; Peer reviewed, 2012)
      The advance and rapid development of electronic imaging technology has lead the way to production of imaging sensors capable of acquiring good quality digital images with a high resolution. At the same time the cost and ...
    • Clustering Document Fragments using Background Color and Texture Information 

      Chanda, Sukalpa; Franke, Katrin; Pal, Umapada (Journal article; Peer reviewed, 2012)
      Forensic analysis of questioned documents sometimes can be extensively data intensive. A forensic expert might need to analyze a heap of document fragments and in such cases to ensure reliability he/she should focus ...
    • Collecting fingerprints for recognition using mobile phone cameras 

      Yang, Bian; Li, Xue; Busch, Christoph (Journal article; Peer reviewed, 2012)
      We present in this paper a sample quality control approach for the case using a mobile phone’s camera as a fingerprint sensor for fingerprint recognition. Our approach directly estimates the maximum ridge frequency ...