BORA - UiB

Bergen Open Research Archive

Browsing Department of Informatics by Issue Date

Bergen Open Research Archive

Browsing Department of Informatics by Issue Date

Sort by: Order: Results:

  • Abyaneh, Mohammad Reza Sohizadeh (Doctoral thesis, The University of Bergen, 2012-08-08)
    This thesis mainly examines the security analysis of lightweight protocols proposed for providing security and privacy for RFID systems. To achieve this goal, first we give a brief introduction of RFID systems. The ...
  • Danielsen, Lars Eirik (Peer reviewed; Journal article, Institute of Electrical and Electronics Engineers, 2012-08)
    Additive codes over GF(9) that are self-dual with respect to the Hermitian trace inner product have a natural application in quantum information theory, where they correspond to ternary quantum error-correcting codes. ...
  • Cabello, Adán; Danielsen, Lars Eirik; López-Tarrida, Antonio J.; Portillo, José R. (Peer reviewed; Journal article, Institute of Physics, 2012-06-27)
    We introduce a physical approach to social networks (SNs) in which each actor is characterized by a yes–no test on a physical system. This allows us to consider SNs beyond those originated by interactions based on pre-existing ...
  • Pobitzer, Armin (Doctoral thesis, The University of Bergen, 2012-06-22)
    With the increasing use of numerical simulations in the fluid mechanics community in recent years flow visualization increasingly gains importance as an advanced analysis tool for the simulation output. Up to now, ...
  • Alfaki, Mohammed (Doctoral thesis, The University of Bergen, 2012-06-18)
    Pipeline transportation of natural gas is largely affected by restrictions regarding gas quality imposed by the market and the actual quality of the gas produced at sources. From the sources, gas flow streams of unequal ...
  • Dregi, Markus Sortland (Master thesis, The University of Bergen, 2012-06-14)
    Motivated by a search game, Fomin, Heggernes and Telle [Algorithmica, 2005] defined the graph parameter treespan, a generalization of the well studied parameter bandwidth. Treespan is the maximum number of appearances ...
  • Goncearenco, Alexander; Berezovsky, Igor N. (Journal article, BioMed Central, 2012-05-30)
    Background: Despite recent progress in studies of the evolution of protein function, the questions what were the first functional protein domains and what were their basic building blocks remain unresolved. Previously, ...
  • Haugland, Jan Kristian (Master thesis, The University of Bergen, 2012-05-24)
    The topic of this thesis is wind farm optimization. The goal is to be able to decide where to install wind turbines within a given region in order to maximize the power output in two different scenarios: For a fixed number ...
  • Ådlandsvik, Yngve (Master thesis, The University of Bergen, 2012-04-27)
    In this thesis, we generalize the Maiorana-McFarland construction for bent, negabent and bent-negabent Boolean functions and describe a way to computationally search for constructions using these generalizations. We present ...
  • Natvig, Erik (Master thesis, The University of Bergen, 2012-04-27)
    Time series of depth and temperature derived from electronic tagging of fish have been used to construct a stochastic model that aims at capturing main characteristics of the observations. Mixed Ornstein-Uhlenbeck process ...
  • Polonsky, Andrew (Other, 2012-02-28)
  • Valvik, Remi André Bognøy (Master thesis, The University of Bergen, 2012-02-24)
    The usage of mobile phones, PDAs and other mobile communication devices in the context of health is an emerging part of eHealth. In 2010 the American National Institutes of Health defined mHealth as "The delivery of ...
  • Waage, Aleksander Vatle (Master thesis, The University of Bergen, 2012-01-27)
  • Schilling, Thorsten Ernst; Raddum, Håvard (Peer reviewed; Chapter, Springer Berlin Heidelberg, 2012)
    We study a new representation of non-linear multivariate equations for algebraic cryptanalysis. Using a combination of multiple right hand side equations and binary decision diagrams, our new representation allows a ...
  • Schilling, Thorsten Ernst; Zajac, Pavol (Peer reviewed; Chapter, Versita Open, 2012)
    Many problems, including algebraic cryptanalysis, can be transformed to a problem of solving a (large) system of sparse Boolean equations. In this article we study 2 algorithms that can be used to remove some redundancy ...
  • Schilling, Thorsten Ernst; Raddum, Håvard (Peer reviewed; Chapter, Springer Berlin Heidelberg, 2012)
    In this paper we describe an approach for solving complex multivariate equation systems related to algebraic cryptanalysis. The work uses the newly introduced Compressed Right Hand Sides (CRHS) representation, where ...
  • Abyaneh, Mohammad Reza Sohizadeh (Conference object, The author, 2012)
    Recently, a new privacy-preserving elliptic curve based grouping proof protocol with colluding tag prevention( CTP) has been proposed. The CTP protocol is claimed to be resistant against colluding tags attacks in which ...
  • Abyaneh, Mohammad Reza Sohizadeh (Conference object, The author, 2012)
    As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) protocol. In contrast to ...
  • Bezem, Marcus A.; Hovland, Dag; Truong, Anh Hoang (Peer reviewed; Journal article, Elsevier, 2012)
    We identify an abstract language for component software based on process algebra. Besides the usual operators for sequential, alternative and parallel composition, it has primitives for instantiating components and for ...
  • Abyaneh, Mohammad Reza Sohizadeh (Conference object, The author, 2012)
    In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated against the tag owners as adversaries. The first protocol called ROTIV is a scheme which provides a privacy-preserving ...

Search BORA


Browse

My Account