Blar i Department of Information and Communication Technology på tittel
Viser treff 998-1017 av 1275
-
Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications
(Peer reviewed; Journal article, 2023)One of the most significant recent advances in technology is the advent of unmanned aerial vehicles (UAVs), i.e., drones. They have widened the scope of possible applications and provided a platform for a wide range of ... -
Secure Group Communication Using Fractional Public Keys
(Chapter; Peer reviewed, 2010)In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement scheme that is based on fractional public keys. Shared group keys are computed ... -
Secure interworking with P2PSIP and IMS
(Academic article, 2010)In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3. party ... -
Secure multi-party based cloud computing framework for statistical data analysis of encrypted data
(Master thesis, 2013)Secure Multi-party Computation (SMC) is a paradigm used to accomplish a common computation among multiple users while keeping the data of each party secret from others. In recent years there has been a keen interest among ... -
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks
(Journal article; Peer reviewed, 2010)In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical ... -
Securing Assets with RFID
(Master thesis, 2008)Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology ... -
Security and Privacy Assessment for Medical Technical Devices: A Playbook for Evaluating Cybersecurity and Privacy
(Master thesis, 2023)This thesis presents a detailed assessment methodology for medical devices that use Bluetooth connectivity, incorporating both technical and privacy considerations. The framework, referred to as the playbook, provides a ... -
Security and privacy for wireless ad-hoc networks
(Master thesis, 2006)The common belief of that mobile network makes security and privacy more difficult to establish is not always correct. Also the fact that several types of wireless technology make nodes vulnerable to monitoring and ... -
Security in GPRS
(Master thesis, 2001)GPRS offers the user an “always on” connection to Internet and Intranet. Some of the services may require high level of security. This can be financial transaction over the Internet, or exchange of confidential documents ... -
Security in mobile wireless sensor networks - A survey
(Journal article; Peer reviewed, 2011)Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various ... -
Security in NFC with Wi‐Fi Protected Setup as a use
(Master thesis, 2008)Near Field Communication is a short‐range communication channel that is one of the most promising technologies around. One of the purposes for this technology is to simplify first‐time connections to other wireless ... -
Security in the Wireless Application Protocol : post-graduate thesis in information and communication technology
(Master thesis, 2000)The necessity of being online wherever you are and at any time, have brought foreword the WAP technology. Solution based on banking, industry, and sale among others, is services and application that are on the market to ... -
Security issues in epassports : ICAO standard and national implementations as part of the US visa-waiver program
(Master thesis, 2006)After the 9/11 terror attacks against the US there have been concerns about how to positively identify every individual entering a country. As a direct result ePassports are now being issued in several countries all over ... -
Security Management in Health Care Information Systems- A Literature Review
(Chapter; Peer reviewed, 2018) -
Security of Big Data in Healthcare Systems
(Master thesis, 2022)As cyber-attacks have become more common and sophisticated, the need for a stable security framework has become essential. Information security requirements must be met by digital technologies utilized in the health care ... -
Security of Big Data in Healthcare Systems
(Master thesis, 2022)As cyber-attacks have become more common and sophisticated, the need for a stable security framework has become essential. Information security requirements must be met by digital technologies utilized in the health care ... -
SECURITY ON THE MIS AND THE INTERFACING MODEM
(Master thesis, 2012)Konfidensiell til / confidential until 01.07.2017 -
Security Patch Management - An Overview of the Patching Process and its Challenges in Norwegian Businesses
(Master thesis, 2022)Cyber-attacks are growing more frequent and sophisticated, and they are impacting businesses of all sizes. This encourages businesses to utilize safe, flaw-free systems, making them less susceptible to cyber-attacks. The ... -
Security Patch Management - An Overview of the Patching Process and its Challenges in Norwegian Businesses
(Master thesis, 2022)Cyber-attacks are growing more frequent and sophisticated, and they are impacting businesses of all sizes. This encourages businesses to utilize safe, flaw-free systems, making them less susceptible to cyber-attacks. The ... -
Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study
(Peer reviewed; Journal article, 2020)