20 research outputs found

    The NISK 2018 Proceedings: Message from the Programme Chairs

    Get PDF
    Source at https://ojs.bibsys.no/index.php/NISK.This NISK Journal volume 11 is the published proceedings of the papers presented at NISK 2018: the 11th Norwegian Information Security Conference 2018 held on September 18-20, 2018 in Longyearbyen, Svalbard. The aim of the NISK conference series is to be the principal Norwegian research venue for presenting and discussing developments in the field of ICT security and privacy, and bringing together people from universities, industry, and public authorities. We invite both national and international contributions by researchers, practitioners, and PhD- and Master thesis students presenting new problems and solutions within topics on ICT security

    The NISK 2021 Proceedings: Message from the Programme Chairs

    Get PDF
    No abstract

    Digital Forensics and Cyber Crime: Second International ICST Conference ICDF2C 2010 Abu Dhabi, United Arab Emirates, October 4-6, 2010 Revised Selected Papers

    Get PDF
    This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2010, held October 4-6, 2010 in Abu Dhabi, United Arab Emirates. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 14 papers in this volume descibe the various applications of this technology and cover a wide range of topics including law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare.https://digitalcommons.newhaven.edu/electricalcomputerengineering-books/1004/thumbnail.jp

    Preface

    No full text
    Hackers, in the wide positive sense, are often enthusiastic presenters of their practical experience and exploits, but quite indifferent to writing papers. By contrast, scientists are good at writing papers, but often oblivious to the actual details of practice. At times, this difference in approach incites antagonistic attitudes between these communities. We wanted to mingle the two, shall we say, the explorers and the explanators, for mutual inspiration and communication to the benefit of the conference topic. Certainly a risky ambition, but we wanted to give it a try. And judging by the response from the participants, we succeeded

    Introducing Mobile Network Security Experiments to Communication Technology Education

    No full text
    We describe a new viable lab assignment that enhances the theoretical study of wireless network security in our master-level communication technology education with hands-on mobile access network experimentation for the students. This new part is added to a well established student lab on wireless network security, by making use of low cost software defined radio devices and readily available open source software for experiments with one-cell GSM mobile access networks. The students can use their own smartphones. The overall objective of the lab is to support the students' practical understanding of the technical problems of building and managing wireless network security mechanisms. We report our findings and experiences from designing, constructing, testing and managing this lab assignment in the autumn semester of 2016

    Private Identification of Subscribers in Mobile Networks: Status and Challenges

    No full text
    The privacy of individuals in the context of mobile networks is crucial nowadays. Nevertheless, too few improvements have been made over the years to secure the privacy of subscribers. As a consequence, current generations of mobile networks, including 4G/LTE, are susceptible to sensitive information leakage. In particular, individuals are exposed to location disclosure and movement tracking by revealing subscribers' permanent identifiers. In this article, we discuss the subscribers' private identification problem in light of the recent standardization for 5G. We introduce the problem and discuss existing cryptographic solutions, with a focus on the ECIES-based solution adopted for 5G. We then investigate to what extent the privacy protection mechanisms introduced by the 5G security architecture answer our problem. Finally, we identify challenges, and we distinguish domains of interest and specific research activities to address these challenges

    The Challenge of Private Identification

    No full text
    The cryptographic protocol problem of how to make a secure exchange of identifying information among communicating entities, in particular within security constraints of confidentiality and personal privacy, is here denoted as the private identification problem. We consider this to be still an open problem. Although we can find its motivation and partial solutions in some of the existing systems, this paper describes the problem in a more generalised form. What is the solution space of efficient and scalable private identification protocols within the settings of the various communication systems and models, for instance in future mobile communication systems with very low latency requirements? Possible directions and solutions are discussed, in terms of pseudonyms, temporary identifiers, computational trade-offs such as key search, and public key solutions. All existing proposals to the private identification challenge suffer from one or more limitations and weaknesses, such as computational costs and time latencies, or the security is reduced. Finally, the paper collects a considerable reference list of papers related to the problem of private identification

    Høringssvar ang. forslag til endringer i valgforskriften

    No full text
    Dette høringssvaret har sitt utgangspunkt i et masteroppgavearbeid av Vilde Amundsen under utførelse dette høstsemesteret ved Institutt for informasjonssikkerhet og kommunikasjonsteknologi ved NTNU, i samarbeid med ekstern veileder M.Sc. Patricia Aas, og intern veileder og faglig ansvarlig professor Stig F. Mjølsnes. Mastergradsarbeidet har som oppgave å beskrive og undersøke informasjonssikkerheten i EVA Skanning-systemet, og analysere de mekanismer og prosedyrer for å oppdage feil som benyttes i manuell og maskinell telling. Innsamlingen og bearbeiding av informasjon om disse problemstillingene har kandidaten gjort ved å intervjue representanter fra Kommunal- og moderniseringsdepartementet, i Valgdirektoratet og valgansvarlige i 18 kommuner. Videre har Valgdirektoratet gjort en demonstrasjon for studenten av det nye EVA Skanning systemet under utvikling for valget i 2019. Master-rapporten blir ferdigstilt januar 2019
    corecore