Now showing items 2646-2665 of 3253

    • Secure and Efficient Data Storage in Unattended Wireless Sensor Networks 

      Ren, Yi; Oleshchuk, Vladimir A.; Li, Frank Yong (Journal article; Peer reviewed, 2009)
      Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage ...
    • Secure and scalable dataprocessing and communications for an Animal Tracking System 

      Johansen, Ynge Farbu; Vinningland, Øystein (Master thesis, 2003)
      Modern technology is constantly being employed in new fields, by new industries and people. The cost of advanced technological equipment decreases continously, and equipment that was reserved for people and corporations ...
    • Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications 

      Mishra, Amit Kumar; Wazid, Mohammad; Singh, Devesh Pratap; Das, Ashok Kumar; Singh, Jaskaran; Vasilakos, Athanasios (Peer reviewed; Journal article, 2023)
      One of the most significant recent advances in technology is the advent of unmanned aerial vehicles (UAVs), i.e., drones. They have widened the scope of possible applications and provided a platform for a wide range of ...
    • Secure Group Communication Using Fractional Public Keys 

      Eskeland, Sigurd; Oleshchuk, Vladimir A. (Chapter; Peer reviewed, 2010)
      In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement scheme that is based on fractional public keys. Shared group keys are computed ...
    • Secure interworking with P2PSIP and IMS 

      Zheng, Xianghan; Oleshchuk, Vladimir A (Academic article, 2010)
      In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3. party ...
    • Secure multi-party based cloud computing framework for statistical data analysis of encrypted data 

      Gardiyawasam Pussewalage, Harsha Sandaruwan; Ranaweera, P. Sashmal (Master thesis, 2013)
      Secure Multi-party Computation (SMC) is a paradigm used to accomplish a common computation among multiple users while keeping the data of each party secret from others. In recent years there has been a keen interest among ...
    • Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks 

      Ren, Wei; Ren, Yi; Zhang, Hui (Journal article; Peer reviewed, 2010)
      In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical ...
    • Securing Assets with RFID 

      Oustad, Mats; Chanrasekaram, Santhakumar (Master thesis, 2008)
      Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology ...
    • Security and Privacy Assessment for Medical Technical Devices: A Playbook for Evaluating Cybersecurity and Privacy 

      Martini, Mari (Master thesis, 2023)
      This thesis presents a detailed assessment methodology for medical devices that use Bluetooth connectivity, incorporating both technical and privacy considerations. The framework, referred to as the playbook, provides a ...
    • Security and privacy for wireless ad-hoc networks 

      Pettersen, Audun; Åsen, Frode (Master thesis, 2006)
      The common belief of that mobile network makes security and privacy more difficult to establish is not always correct. Also the fact that several types of wireless technology make nodes vulnerable to monitoring and ...
    • Security in GPRS 

      Bjåen, Geir Stian; Kaasin, Erling (Master thesis, 2001)
      GPRS offers the user an “always on” connection to Internet and Intranet. Some of the services may require high level of security. This can be financial transaction over the Internet, or exchange of confidential documents ...
    • Security in mobile wireless sensor networks - A survey 

      Ren, Yi; Oleshchuk, Vladimir A; Li, Frank Yong; Ge, Xiaohu (Journal article; Peer reviewed, 2011)
      Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various ...
    • Security in NFC with Wi‐Fi Protected Setup as a use 

      Magnussen, Rune; Oppheim, Sølve (Master thesis, 2008)
      Near Field Communication is a short‐range communication channel that is one of the most promising technologies around. One of the purposes for this technology is to simplify first‐time connections to other wireless ...
    • Security in the Wireless Application Protocol : post-graduate thesis in information and communication technology 

      Storfjord, Monica (Master thesis, 2000)
      The necessity of being online wherever you are and at any time, have brought foreword the WAP technology. Solution based on banking, industry, and sale among others, is services and application that are on the market to ...
    • Security issues in epassports : ICAO standard and national implementations as part of the US visa-waiver program 

      Bjelkåsen, Eili; Olsen, Linda Walbeck (Master thesis, 2006)
      After the 9/11 terror attacks against the US there have been concerns about how to positively identify every individual entering a country. As a direct result ePassports are now being issued in several countries all over ...
    • Security Management in Health Care Information Systems- A Literature Review 

      Smaradottir, Berglind (Chapter; Peer reviewed, 2018)
    • Security Mechanisms in Unattended Wireless Sensor Networks 

      Yi, Ren (Doctoral Dissertation by the University of Agder;39, Doctoral thesis; Peer reviewed, 2011)
      Wireless Sensor Networks (WSNs) consisting of a large number of sensor nodes are being deployed in potentially hostile environments for applications such as forest fire detection, battlefield surveillance, habitat ...
    • Security of Big Data in Healthcare Systems 

      Mathisen, Vegard Saavesen; Markeng, Øyvind Hammer (Master thesis, 2022)
      As cyber-attacks have become more common and sophisticated, the need for a stable security framework has become essential. Information security requirements must be met by digital technologies utilized in the health care ...
    • Security of Big Data in Healthcare Systems 

      Mathisen, Vegard Saavesen; Markeng, Øyvind Hammer (Master thesis, 2022)
      As cyber-attacks have become more common and sophisticated, the need for a stable security framework has become essential. Information security requirements must be met by digital technologies utilized in the health care ...
    • SECURITY ON THE MIS AND THE INTERFACING MODEM 

      Azadagli, Emmanuel Mensah (Master thesis, 2012)
      Konfidensiell til / confidential until 01.07.2017