• Sammenkobling av lyd og visuelle effekter ved hjelp av datateknologi 

      Meier, Thomas (Master thesis, 2006)
      Sammenkobling av lyd og visuelle effekter kan man i dag se på diverse multimedieapplikasjoner. De applikasjonene som brukes i dag, bruker som regel metoder og algoritmer der man ser på frekvensene til et musikkstykke. ...
    • Sammenligningsstudie av læringsplattformer 

      Olsen, Tom Lunner (Master thesis, 2022)
      Denne oppgaven omhandler sammenligning av digitale læringsplattformer. Grunnlaget for oppgaven var å utvikle to nettbaserte kurs for Utviklingssenter for sykehjem hjemmetjenester Agder. For å utvikle kursene ble det brukt ...
    • SCADA Intrusion Detection System Test Framework 

      Waagsnes, Henrik (Master thesis, 2017)
      Supervisory control and data acquisition (SCADA) systems play an important role in our critical infrastructure (CI). Several of the protocols used in SCADA communication are old and lack of security mechanisms. This ...
    • Scenario-based Serious Game to Teach about Healthcare 

      Schulz, Renee Patrizia; Smaradottir, Berglind; Torblå Olsen, Joakim; Prinz, Andreas (Chapter; Peer reviewed, 2019)
      In this paper, we explore the concept of a scenario-based serious game for healthcare solutions. The complexity of the interactions and the multitude of actors is captured in a scenario, which is then played with the help ...
    • Scenarios for Crisis in European Critical Energy Infrastructure 

      Li, Jing; Li, Pei (Master thesis, 2009)
      A sudden crisis occurrence, such as a big electricity cut, might not be regarded as an isolated incident: In almost all cases, a power outage crisis might bring about multiple losses with e.g. legal, social and economic ...
    • Seamless Hand-over Algorithm for Wireless Enterprise Networks 

      Hodnebrog, Gjermund; Jin, Qi (Master thesis, 2007)
      The mass deployment of the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 based wireless local area networks (WLAN) and increased sales in hand-held devices supporting WLAN have resulted in an urgent ...
    • Searchable Privacy-Enabled Information and Event Management Solution. 

      Seneger, Kristoffer T. (Master thesis, 2015)
      With network traffic proliferating over the last couple of decades, there is an increasing need to monitor security information in order to prevent and resolve network security threats. A Security Information and Event ...
    • Secure and Efficient Data Storage in Unattended Wireless Sensor Networks 

      Ren, Yi; Oleshchuk, Vladimir A.; Li, Frank Yong (Journal article; Peer reviewed, 2009)
      Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage ...
    • Secure and scalable dataprocessing and communications for an Animal Tracking System 

      Johansen, Ynge Farbu; Vinningland, Øystein (Master thesis, 2003)
      Modern technology is constantly being employed in new fields, by new industries and people. The cost of advanced technological equipment decreases continously, and equipment that was reserved for people and corporations ...
    • Secure Group Communication Using Fractional Public Keys 

      Eskeland, Sigurd; Oleshchuk, Vladimir A (Peer reviewed; Journal article, 2010)
      In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement scheme that is based on fractional public keys. Shared group keys are computed ...
    • Secure interworking with P2PSIP and IMS 

      Zheng, Xianghan; Oleshchuk, Vladimir A (Academic article, 2010)
      In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3. party ...
    • Secure multi-party based cloud computing framework for statistical data analysis of encrypted data 

      Gardiyawasam Pussewalage, Harsha Sandaruwan; Ranaweera, P. Sashmal (Master thesis, 2013)
      Secure Multi-party Computation (SMC) is a paradigm used to accomplish a common computation among multiple users while keeping the data of each party secret from others. In recent years there has been a keen interest among ...
    • Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks 

      Ren, Wei; Ren, Yi; Zhang, Hui (Journal article; Peer reviewed, 2010)
      In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical ...
    • Securing Assets with RFID 

      Oustad, Mats; Chanrasekaram, Santhakumar (Master thesis, 2008)
      Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology ...
    • Security and Privacy Assessment for Medical Technical Devices: A Playbook for Evaluating Cybersecurity and Privacy 

      Martini, Mari (Master thesis, 2023)
      This thesis presents a detailed assessment methodology for medical devices that use Bluetooth connectivity, incorporating both technical and privacy considerations. The framework, referred to as the playbook, provides a ...
    • Security and privacy for wireless ad-hoc networks 

      Pettersen, Audun; Åsen, Frode (Master thesis, 2006)
      The common belief of that mobile network makes security and privacy more difficult to establish is not always correct. Also the fact that several types of wireless technology make nodes vulnerable to monitoring and ...
    • Security in GPRS 

      Bjåen, Geir Stian; Kaasin, Erling (Master thesis, 2001)
      GPRS offers the user an “always on” connection to Internet and Intranet. Some of the services may require high level of security. This can be financial transaction over the Internet, or exchange of confidential documents ...
    • Security in mobile wireless sensor networks - A survey 

      Ren, Yi; Oleshchuk, Vladimir A; Li, Frank Yong; Ge, Xiaohu (Journal article; Peer reviewed, 2011)
      Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various ...
    • Security in NFC with Wi‐Fi Protected Setup as a use 

      Magnussen, Rune; Oppheim, Sølve (Master thesis, 2008)
      Near Field Communication is a short‐range communication channel that is one of the most promising technologies around. One of the purposes for this technology is to simplify first‐time connections to other wireless ...
    • Security in the Wireless Application Protocol : post-graduate thesis in information and communication technology 

      Storfjord, Monica (Master thesis, 2000)
      The necessity of being online wherever you are and at any time, have brought foreword the WAP technology. Solution based on banking, industry, and sale among others, is services and application that are on the market to ...