Show simple item record

dc.contributor.authorMoen, Vebjørneng
dc.date.accessioned2006-10-16T12:54:40Z
dc.date.available2006-10-16T12:54:40Z
dc.date.issued2006-10-04eng
dc.identifier.isbn82-308-0232-7 (print version)eng
dc.identifier.urihttp://hdl.handle.net/1956/1901
dc.description.abstractThe society relies more and more on interconnected computers systems and distributed applications. This dissertation considers security in such systems, focusing on how to break the security. Online banking, wireless systems with thin clients, and e-government are covered by the seven papers included in the thesis.en
dc.format.extent596901 byteseng
dc.format.extent451642 byteseng
dc.format.extent511376 byteseng
dc.format.extent474137 byteseng
dc.format.extent460584 byteseng
dc.format.extent445242 byteseng
dc.format.extent424750 byteseng
dc.format.extent472982 byteseng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.format.mimetypeapplication/pdfeng
dc.language.isoengeng
dc.publisherThe University of Bergeneng
dc.relation.haspartPaper 1: Tjøstheim, Thomas and Moen, Vebjørn, Vulnerabilities in Online Banks. (pre-print).eng
dc.relation.haspartPaper 2: Published in IEEE Security & Privacy, Vol 4, No. 2, Hole, Kjell Jørgen, Moen, Vebjørn, and Tjøstheim, Thomas, Case Study: Online Banking Security, March/April 2006, pp. 14-20. Copyright Institute of Electrical and Electronics Engineers (IEEE). This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. The published version available at: <a href="http://doi.ieeecomputersociety.org/10.1109/MSP.2006.36"target=_blank>http://doi.ieeecomputersociety.org/10.1109/MSP.2006.36</a>eng
dc.relation.haspartPaper 3: Hole, Kjell J., Moen, Vebjørn, and Klingsheim, André N., Lessons from the Norwegian ATM system. (pre-print).eng
dc.relation.haspartPaper 3 Reply: Lessions from the Norwegian ATM system : BSK comments with reply from authors.eng
dc.relation.haspartPaper 4: Published in ACM SIGMOBILE Mobile Computing and Communications Review, Volume 8, Issue 2, Moen, Vebjørn, Raddum, Håvard, and Hole, Kjell J., Weaknesses in the Temporal Key Hash of WPA, April 2004, pp. 76-83. Copyright ACM Press. Published version available at: <a href="http://doi.acm.org/10.1145/997122.997132"target=_blank>http://doi.acm.org/10.1145/997122.997132</a>eng
dc.relation.haspartPaper 5: imonsen, Kent Inge, Moen, Vebjørn, and Hole, Kjell Jørgen, Attack on Sun's MIDP Reference Implementation of SSL. (pre-print).eng
dc.relation.haspartPaper 6: Klingsheim, André N., Moen, Vebjørn, and Hole, Kjell J., Secure Networked J2ME Applications: Problems and Challenges. (pre-print).eng
dc.relation.haspartPaper 7: Moen, Vebjørn, Klingsheim, André N., Simonsen, Kent Inge Fagerland, and Hole, Kjell Jørgen,Vulnerabilities in E-Governments. (pre-print).eng
dc.titleVulnerabilities in distributed computer systemseng
dc.typeDoctoral thesiseng
dc.subject.nsiVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420nob
dc.subject.nsiVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424nob
dc.subject.nsiVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Databaser og multimediasystemer: 428nob


Files in this item

Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record