Vis enkel innførsel

dc.contributor.authorMoen, Vebjørneng
dc.date.accessioned2006-10-16T12:54:40Z
dc.date.available2006-10-16T12:54:40Z
dc.date.issued2006-10-04eng
dc.identifier.isbn82-308-0232-7 (print version)en_US
dc.identifier.urihttps://hdl.handle.net/1956/1901
dc.description.abstractThe society relies more and more on interconnected computers systems and distributed applications. This dissertation considers security in such systems, focusing on how to break the security. Online banking, wireless systems with thin clients, and e-government are covered by the seven papers included in the thesis.en_US
dc.format.extent596901 byteseng
dc.format.extent451642 byteseng
dc.format.extent511376 byteseng
dc.format.extent474137 byteseng
dc.format.extent460584 byteseng
dc.format.extent445242 byteseng
dc.format.extent424750 byteseng
dc.format.extent472982 byteseng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.language.isoengeng
dc.publisherThe University of Bergenen_US
dc.relation.haspartPaper 1: Tjøstheim, Thomas and Moen, Vebjørn, Vulnerabilities in Online Banks. (pre-print).en_US
dc.relation.haspartPaper 2: Published in IEEE Security & Privacy, Vol 4, No. 2, Hole, Kjell Jørgen, Moen, Vebjørn, and Tjøstheim, Thomas, Case Study: Online Banking Security, March/April 2006, pp. 14-20. Copyright Institute of Electrical and Electronics Engineers (IEEE). This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. The published version available at: <a href="http://doi.ieeecomputersociety.org/10.1109/MSP.2006.36"target=_blank>http://doi.ieeecomputersociety.org/10.1109/MSP.2006.36</a>en_US
dc.relation.haspartPaper 3: Hole, Kjell J., Moen, Vebjørn, and Klingsheim, André N., Lessons from the Norwegian ATM system. (pre-print).en_US
dc.relation.haspartPaper 3 Reply: Lessions from the Norwegian ATM system : BSK comments with reply from authors.en_US
dc.relation.haspartPaper 4: Published in ACM SIGMOBILE Mobile Computing and Communications Review, Volume 8, Issue 2, Moen, Vebjørn, Raddum, Håvard, and Hole, Kjell J., Weaknesses in the Temporal Key Hash of WPA, April 2004, pp. 76-83. Copyright ACM Press. Published version available at: <a href="http://doi.acm.org/10.1145/997122.997132"target=_blank>http://doi.acm.org/10.1145/997122.997132</a>en_US
dc.relation.haspartPaper 5: imonsen, Kent Inge, Moen, Vebjørn, and Hole, Kjell Jørgen, Attack on Sun's MIDP Reference Implementation of SSL. (pre-print).en_US
dc.relation.haspartPaper 6: Klingsheim, André N., Moen, Vebjørn, and Hole, Kjell J., Secure Networked J2ME Applications: Problems and Challenges. (pre-print).en_US
dc.relation.haspartPaper 7: Moen, Vebjørn, Klingsheim, André N., Simonsen, Kent Inge Fagerland, and Hole, Kjell Jørgen,Vulnerabilities in E-Governments. (pre-print).en_US
dc.titleVulnerabilities in distributed computer systemsen_US
dc.typeDoctoral thesis
dc.subject.nsiVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420nob
dc.subject.nsiVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424nob
dc.subject.nsiVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Databaser og multimediasystemer: 428nob


Tilhørende fil(er)

Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel