Change search
Refine search result
1234567 1 - 50 of 1841
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    Abdollahi, Kamran
    et al.
    Computer and Science Department Iran University of Science and Technology Tehran, Iran.
    Shams Shafigh, Alireza
    Computer and Science Department Iran University of Science and Technology Tehran, Iran.
    Kassler, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Improving Performance of On Demand Multicast Routing by deleting lost join query packet2010In: Proceedings of The Sixth Advanced International Conference on Telecommunications - AICT 2010, IEEE conference proceedings, 2010, 316-322 p.Conference paper (Refereed)
    Abstract [en]

    A Mobile ad hoc network is a collection of wireless nodes that dynamically organize themselves to form a network without the need for any fixed infrastructure or centralized administration. The network topology dynamically changes frequently in an unpredictable manner since nodes are free to move. Support for multicasting is essential in such environment as it is considered to be an efficient way to deliver information from source nodes to many client nodes. A problem with multicast routing algorithms is their efficiency as their forwarding structure determines the overall network resource consumption makes them significantly less efficient than unicast routing algorithms. In this research, we improve the performance of the popular ODMRP multicast routing protocol by restricting the domain of join query packets, which have been lost. This is achieved by augmenting the join query packets with minimum extra information (one field), which denotes the number of the visited node from previous forwarding group. Simulation results show, that our mechanisms significantly reduce the control traffic and thus the overall latency and power consumption in the network.

  • 2. Abu Bakar, Sakhinah
    et al.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Characterization of essential proteins in proteins interaction networks,2013In: Journal of Quality Measurement and Analysis, Vol. 9, no 2, 11-26 p.Article in journal (Refereed)
  • 3. Adams, Robin
    et al.
    Fischer, Sally
    Pears, Arnold
    Börstler, Jürgen
    Boustedt, Jonas
    Dalenius, Peter
    Eken, Gunilla
    Heyer, Tim
    Jacobsson, Andreas
    Lindberg, Vanja
    Molin, Bemgt
    Moström, Jan-Erik
    Wiggberg, Mattias
    What is the Word for "Engineering" in Swedisch: Swedish Students Conceptions of their Discipline2007Report (Refereed)
  • 4.
    Adamsson, Tim
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School.
    Kravrekommendation: En undersökning för kravrekommendationer för Nya Intranätets forum på Karlstad Universitet2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 5.
    Afzal, Zeeshan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Towards Secure Multipath TCP Communication2017Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    The evolution in networking coupled with an increasing demand to improve user experience has led to different proposals to extend the standard TCP. Multipath TCP (MPTCP) is one such extension that has the potential to overcome few inherent limitations in the standard TCP. While MPTCP's design and deployment progresses, most of the focus has been on its compatibility. The security aspect is confined to making sure that the MPTCP protocol itself offers the same security level as the standard TCP.

    The topic of this thesis is to investigate the unexpected security implications raised by using MPTCP in the traditional networking environment. The Internet of today has security middle-boxes that perform traffic analysis to detect intrusions and attacks. Such middle-boxes make use of different assumptions about the traffic, e.g., traffic from a single connection always arrives along the same path. This along with many other assumptions may not be true anymore with the advent of MPTCP as traffic can be fragmented and sent over multiple paths simultaneously.

    We investigate how practical it is to evade a security middle-box by fragmenting and sending traffic across multiple paths using MPTCP. Realistic attack traffic is used to evaluate such attacks against Snort IDS to show that these attacks are feasible. We then go on to propose possible solutions to detect such attacks and implement them in an MPTCP proxy. The proxy aims to extend the MPTCP performance advantages to servers that only support standard TCP, while ensuring that intrusions can be detected as before. Finally, we investigate the potential MPTCP scenario where security middle-boxes only have access to some of the traffic. We propose and implement an algorithm to perform intrusion detection in such situations and achieve a nearly 90% detection accuracy. Another contribution of this work is a tool, that converts IDS rules into equivalent attack traffic to automate the evaluation of a middle-box.

  • 6.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Garcia, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Health, Science and Technology (starting 2013).
    Partial Signature Matching in an MPTCP World using Insert-only Levenshtein DistanceManuscript (preprint) (Other academic)
    Abstract [en]

    This paper proposes a methodology consisting of a constrained version of the Levenshtein distance that can be used to detect signatures from partial traffic. The proposed algorithm is formally presented, implemented, and tested using the latest available version of the Snort ruleset. The results show that the algorithm can successfully detect all partial signatures with nearly 90% accuracy.

  • 7.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Automated Testing of IDS Rules2015In: Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE Eighth International Conference on, IEEE conference proceedings, 2015Conference paper (Refereed)
    Abstract [en]

    As technology becomes ubiquitous, new vulnerabilities are being discovered at a rapid rate. Security experts continuously find ways to detect attempts to exploit those vulnerabilities. The outcome is an extremely large and complex rule set used by Intrusion Detection Systems (IDSs) to detect and prevent the vulnerabilities. The rule sets have become so large that it seems infeasible to verify their precision or identify overlapping rules. This work proposes a methodology consisting of a set of tools that will make rule management easier.

  • 8.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    IDS rule management made easy2016In: Electronics, Computers and Artificial Intelligence (ECAI), 2016 8th International Conference on, IEEE conference proceedings, 2016Conference paper (Refereed)
    Abstract [en]

    Signature-based intrusion detection systems (IDSs) are commonly utilized in enterprise networks to detect and possibly block a wide variety of attacks. Their application in industrial control systems (ICSs) is also growing rapidly as modem ICSs increasingly use open standard protocols instead of proprietary. Due to an ever changing threat landscape, the rulesets used by these IDSs have grown large and there is no way to verify their precision or accuracy. Such broad and non-optimized rulesets lead to false positives and an unnecessary burden on the IDS, resulting in possible degradation of the security. This work proposes a methodology consisting of a set of tools to help optimize the IDS rulesets and make rule management easier. The work also provides attack traffic data that is expected to benefit the task of IDS assessment.

  • 9.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Health, Science and Technology (starting 2013).
    Multipath TCP IDS Evasion and Mitigation2015In: Information Security: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings, Springer, 2015, Vol. 9290, 265-282 p.Conference paper (Refereed)
    Abstract [en]

    The existing network security infrastructure is not ready for future protocols such as Multipath TCP (MPTCP). The outcome is that middleboxes are configured to block such protocols. This paper studies the security risk that arises if future protocols are used over unaware infrastructures. In particular, the practicality and severity of cross-path fragmentation attacks utilizing MPTCP against the signature-matching capability of the Snort intrusion detection system (IDS) is investigated. Results reveal that the attack is realistic and opens the possibility to evade any signature-based IDS. To mitigate the attack, a solution is also proposed in the form of the MPTCP Linker tool. The work outlines the importance of MPTCP support in future network security middleboxes.

  • 10.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lidén, Anders
    Towards Multipath TCP Aware Security Technologies2016In: New Technologies, Mobility and Security (NTMS), 2016 8th IFIP International Conference on, IEEE conference proceedings, 2016Conference paper (Refereed)
    Abstract [en]

    Multipath TCP (MPTCP) is a proposed extension to TCP that enables a number of performance advantages that have not been offered before. While the protocol specification is close to being finalized, there still remain some unaddressed challenges regarding the deployment and security implications of the protocol. This work attempts to tackle some of these concerns by proposing and implementing MPTCP aware security services and deploying them inside a proof of concept MPTCP proxy. The aim is to enable hosts, even those without native MPTCP support, to securely benefit from the MPTCP performance advantages. Our evaluations show that the security services that are implemented enable proper intrusion detection and prevention to thwart potential attacks as well as threshold rules to prevent denial of service (DoS) attacks.

  • 11.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Health, Science and Technology (starting 2013).
    Lidén, Anders
    A Multipath TCP Proxy2015Conference paper (Refereed)
    Abstract [en]

    Multipath TCP (MPTCP) is an extension to traditionalTCP that enables a number of performance advantages,which were not offered before. While the protocol specificationis close to being finalized, there still remain some concernsregarding deployability and security. This paper describes theon going work to develop a solution that will facilitate thedeployment of MPTCP. The solution will not only allow non-MPTCP capable end-hosts to benefit from MPTCP performancegains, but also help ease the network security concerns that manymiddleboxes face due to the possibility of data stream beingfragmented across multiple subflows.

  • 12.
    Afzal, Zeeshan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Rossebø, Judith
    Integrated Operations, ABB AS, Norway.
    Chowdhury, Mohammad
    Talha, Batool
    ABB Corporate Research, ABB AS, Norway.
    A Wireless Intrusion Detection System for 802.11 networks2016In: PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), IEEE conference proceedings, 2016, 828-834 p.Conference paper (Refereed)
    Abstract [en]

    Wireless local area networks (WLANs) deployment is increasing rapidly. At the same time, WLANs have become an attractive target for many potential attackers. In spite of that, the de facto standard used to implement most WLANs (IEEE 802.11) has what appear to be residual vulnerabilities related to identity spoofing. In this paper, a pragmatic study of two common attacks on the standard is conducted. These attacks are then implemented on test beds to learn attack behavior. Finally, novel attack signatures and techniques to detect these attacks are devised and implemented in a proof of concept Wireless Intrusion Detection System (WIDS).

  • 13.
    Aguiño, Gonzalo Iglesias
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Performance of VoIP strategies for hybrid Mobile Ad Hoc Networks2007Independent thesis Advanced level (degree of Magister), 20 points / 30 hpStudent thesis
    Abstract [en]

    Last decade, a lot of research has been done in wireless communication technologies. Mobile

    nodes such personal digital assistants (PDAs), notebooks and cell phones are nowadays used

    in human’s daily life.

    MANETs are networks consisting of two or more mobile nodes equipped with wireless

    communication and networking capabilities, but they don’t have any network centrilized

    infrastructure.

    In last few years, MANETs have been emerged to be an important researched subject in the

    field of wireless networking.

    MANETs are autonomous; however they can communicate with other external networks such

    the internet. They are linked to such external networks by mobile nodes acting as gateways.

    This kind of networks is known as hybrid MANETs.

    Voice over Internet Protocol (VoIP), is a technology that allows you to make voice calls using

    a Internet connection instead of a regular (or analog) phone line.

    The goal of this thesis is evaluate the performance of VoIP strategies for hybrid MANETs.

    Two different aspects are evaluated, the session establishment performance and the voice

    quality.

    Network Simulator 2 is used to run several simulations, two different applications are used to

    run voice simulations (Session Initiation Protocol and Exponential traffic generator). We

    evaluate two different cases for voice traffics, voice calls between two MANET nodes and

    voice calls between MANET nodes and external nodes.

    After running the simulations, there are some performance parameters which will reveal the

    results. The key findings of the simulations are: adding gateways, number of voice traffic

    flows and the number of hops between source and destinations. There are some interesting

    results which reveal for example, that adding gateways is not always beneficial.

  • 14. Agustí, Ramón
    et al.
    Fazekas, Péter
    Gómez Barquero, David
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Oliver, Miquel
    Pérez-Romero, Jordi
    Tralli, Velio
    NEWCOM DR7.2: First report on common framework/models and activities in Department 72005Report (Refereed)
    Abstract [en]

    This deliverable provides a description of the framework identified for the collaborative activities between different partners in the context of NEWCOM department 7 on QoS provision in heterogeneous wireless networks. The considered models, assumptions and expected results are pointed out for each activity. The deliverable also includes a report on the means to achieve the integration between the different partners

  • 15. Agustí, Ramón
    et al.
    Fazekas, Péter
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Oliver, Miquel
    Pérez-Romero, Jordi
    Studer Ferreira, Lucio
    Tralli, Velio
    NEWCOM DR7.4: Final Report on the activities carried out in Department 72007Report (Refereed)
    Abstract [en]

    This deliverable constitutes the final report of all the activities that carried out in the framework of the NEWCOM department 7. It contains a description of the main technical achievements for each one of the activities in which the department has been organised togehter with the list of indicators reflecting the degree of integration that has been achieved among the different partners

  • 16. Ahammed, Farhan
    et al.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Finding Lower Bounds of Localization with Noisy Measurements Using Genetic Algorithms2011Report (Refereed)
  • 17.
    Ahammed, Farhan
    et al.
    The University of Sydney, Australia.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Finding lower bounds of localization with noisy measurements using genetic algorithms2011In: Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications (DIVANet '11), Miami, Florida, USA: Association for Computing Machinery (ACM), 2011, 47-54 p.Conference paper (Refereed)
    Abstract [en]

    Vehicular Ad-Hoc Networks (VANETs) are wireless networks with mobile nodes (vehicles) which connect in an ad-hoc manner. Many vehicles use the Global Positioning System (GPS) to provide their locations. However the inaccuracy of GPS devices leads to some vehicles incorrectly assuming they are located at different positions and sometimes on different roads. VANETs can be used to increase the accuracy of each vehicle's computed location by allowing vehicles to share information regarding the measured distances to neighbouring vehicles. This paper looks at finding how much improvement can be made given the erroneous measurements present in the system. An evolutionary algorithm is used to evolve instances of parameters used by the VLOCI2 algorithm, also presented in this paper, to find instances which minimises the inaccuracy in computed locations. Simulation results show a definite improvement in location accuracy and lower bounds on how much improvement is possible is inferred.

  • 18.
    Ahammed, Farhan
    et al.
    The University of Sydney, Sydney, Australia.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Using simulated annealing to find lower bounds of localization with noisy measurements2012In: 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), IEEE conference proceedings, 2012, 601-608 p.Conference paper (Refereed)
  • 19.
    Ahammed, Farhan
    et al.
    The University of Sydney, Australia.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Ott, Max
    NICTA Australia Australian Technology Park.
    LICA: Improving Localization Given Noisy Data In GPS-Equipped VANETs Using Trilateration With Cluster Analysis2011Report (Refereed)
  • 20.
    Ahammed, Farhan
    et al.
    University of Sydney.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Ott, Max
    NICTA.
    VLOCI: Using Distance Measurements to Improve the Accuracy of Location Coordinates in GPS-Equipped VANETs2012In: Mobile and Ubiquitous Systems: 7th International ICST Conference, MobiQuitous 2010, Sydney, Australia, December 6-9, 2010, Revised Selected Papers / [ed] Patrick Sénac, Max Ott, Aruna Seneviratne, Springer Berlin/Heidelberg, 2012, Vol. 73, 149-161 p.Conference paper (Refereed)
  • 21.
    Ahammed, Farhan
    et al.
    The University of Sydney, Australia.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Ott, Max
    NICTA Australia Australian Technology Park.
    VLOCI2: An Iterative Method To Improve Location Coordinates In GPS-Equipped VANETs in Multiple Lanes2011Report (Refereed)
  • 22.
    Ahammed, Farhan
    et al.
    The University of Sydney, Australia.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    Ott, Max
    Australian Technology Park, Australia.
    VLOCI2: An Iterative Method To Improve Location Coordinates In GPS-Equipped VANETs in Multiple Lanes2011Report (Refereed)
  • 23.
    Airola, Rasmus
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Hager, Kristoffer
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Image Classification, Deep Learning and Convolutional Neural Networks: A Comparative Study of Machine Learning Frameworks2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The use of machine learning and specifically neural networks is a growing trend in software development, and has grown immensely in the last couple of years in the light of an increasing need to handle big data and large information flows. Machine learning has a broad area of application, such as human-computer interaction, predicting stock prices, real-time translation, and self driving vehicles. Large companies such as Microsoft and Google have already implemented machine learning in some of their commercial products such as their search engines, and their intelligent personal assistants Cortana and Google Assistant.

    The main goal of this project was to evaluate the two deep learning frameworks Google TensorFlow and Microsoft CNTK, primarily based on their performance in the training time of neural networks. We chose to use the third-party API Keras instead of TensorFlow's own API when working with TensorFlow. CNTK was found to perform better in regards of training time compared to TensorFlow with Keras as frontend. Even though CNTK performed better on the benchmarking tests, we found Keras with TensorFlow as backend to be much easier and more intuitive to work with. In addition, CNTKs underlying implementation of the machine learning algorithms and functions differ from that of the literature and of other frameworks. Therefore, if we had to choose a framework to continue working in, we would choose Keras with TensorFlow as backend, even though the performance is less compared to CNTK.

  • 24. Aitenbichler, Erwin
    et al.
    Behring, Alexander
    Bradler, Dirk
    Hartmann, Melanie
    Martucci, Leonardo
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Mühlhäuser, Max
    Ries, Sebastian
    Schnelle-Walka, Dirk
    Schreiber, Daniel
    Steimle, Jürgen
    Strufe, Thorsten
    Shaping the Future Internet2009In: Shaping the Future Internet, 2009Conference paper (Refereed)
    Abstract [en]

    The Internet of Things (IoT) and the Internet of Services (IoS) are two well-knownexemplars of the emerging ‘Internet variants’. These variants will be tightlyinterwoven yet specific with respect to the supporting technologies needed. Thepresent paper discusses the five variants identified as essential by the authors: IoT,IoS, Internet-of-Humans, Internet-of-Crowds, and Internet-of-Clouds. For eachvariant, a non-comprehensive set of research challenges is cited and related to thestate of the art and to ongoing projects of the lab.

  • 25.
    Al-abuhalje, Afrah
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Al-abuhalje, Sanaa
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Översikt och tillämpning av XML2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    Abstract

    HTML is not powerful enough to handle the increasing demands on Internet applications of today, which is one of the reasons to why a new markup language called XML has been introduced. In this report we describe the basics as well as more advanced parts of XML like DTD, XML Schema and XSLT.

    XML combines the simplicity of HTML and the possibilties of SGML. One of the premier strengths of XML is that it may be used to store any type of data without any considerations to how it will be presented later. The content and the presentation are separated completely. Another important property is that XML documents are stored as

    ordinary text files, which means that XML is system and platform independent.

    In this report our aim consists of two goals. One goal is to create a suitable format for storing configuration data using XML. The configuration data is to be used by a network emulator. In order to emulate the conditions present in a real network the emulator is

    capable of emulating things as bit errors, packet losses, bandwidth limitation and delay, all of which are examples of configuration data. The other goal is to describe the basics as well as more advanced parts of XML in general. As we describe XML, we continuously show how we apply this knowledge to our application. In this way, the reader achieves a good insight into how XML works.

  • 26.
    Ala-Häivälä, Anders
    Karlstad University, Faculty of Social and Life Sciences.
    Batch-digitalisering och GIS-anpassning av analoga enkätdata2007Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
    Abstract [en]

    This report describes the work with utilizing and adapting data from a visitor poll for use in a GIS. The poll was performed by the Municipality of Karlstad and the Swedish Forest Agency to survey peoples visit patterns in the I2-Forest, a former military training field which is now used as a recreation area. The poll consists of a number of questions about the visitor’s activities, age, opinions etc, and a map on which the visitor has drawn his or her path through the forest. Source data is a database containing poll answers, and the original maps with the drawn information. The task is partly to investigate if the maps can be batch-digitalized through scanning and vectorization, and partly to normalize the database.

    A method for digitalizing has been developed and tested on a selection of the maps. The method consists of a number of steps, including image processing, classification and vectorization. According to lack of batch-possibilities in the used GIS software, macros have been created by programming in VBA. The method works well on the selected maps and the conclusion is that it is possible to digitalize the drawn lines automatically. However, there are some shortages regarding accuracy and usability. Furthermore, the selection is relatively small and some adjustments on the settings for classification and vectorization might be necessary when applying the method on a larger part of the data.

    The database has been normalized as far as reasonable with consideration of performance and usability. To enable reliable searches, several attributes has been interpreted and modified through categorization and classification.

    The result is a geodatabase consisting of all poll answers, and the selected data from the digitalization test. To show how the database can be used, two simple examples of analyses have been made.

  • 27.
    Alaqra, Ala(a)
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Groß, Thomas
    Newcastle University, Newcastle, UK.
    Lorünser, Thomas
    Austrian Institute of Technology, Vienna, Austria.
    Slamanig, Daniel
    Graz University of Technology, Graz, Austria.
    Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements2015In: IFIP Advances in Information and Communication Technology, Springer Publishing Company, 2015, Vol. 476, 79-96 p.Conference paper (Refereed)
    Abstract [en]

    This paper summarises the results of a workshop at the IFIP Summer School 2015 introducing the EU Horizon 2020 project PRISMACLOUD, that is, Privacy and Security Maintaining Services in the Cloud. The contributions of this summary are three-fold. Firstly, it provides an overview to the PRISMACLOUD cryptographic tools and use-case scenarios that were presented as part of this workshop. Secondly, it distills the discussion results of parallel focus groups. Thirdly, it summarises a ``Deep Dive on Crypto'' session that offered technical information on the new tools. Overall, the workshop aimed at outlining application scenarios and eliciting end-user requirements for PRISMACLOUD.

  • 28.
    Alaqra, Alaa
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Pettersson, John
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Centre for HumanIT.
    Wästlund, Erik
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Service Research Center.
    Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario2016In: Proceedings of the International Symposium on Human Aspects of Information Security & Assurance, 2016Conference paper (Refereed)
    Abstract [en]

    In this paper, we discuss end user requirements that we elicited for the use of malleable signatures in a Cloud-based eHealth scenario. The concept of a malleable signature, which is a privacy enhancing cryptographic scheme that enables the redaction of personal information from signed documents while preserving the validity of the signature, might be counter- intuitive to end users as its functionality does not correspond to the one of a traditional signature scheme. A qualitative study via a series of semi-structured interviews and focus groups has been conducted to understand stakeholders’ opinions and concerns in regards to the possible applications of malleable signatures in the eHealth area, where a medical record is first digitally signed by a doctor and later redacted by the patient in the cloud. Results from this study yielded user requirements such as the need for suitable metaphors and guidelines, usable templates, and clear redaction policies. 

  • 29.
    Alay, Özgü
    et al.
    Simula Research Laboratory, Norway.
    Lutu, Andra
    Simula Research Laboratory, Norway.
    García, Rafael
    IMDEA Networks Institute, Spain.
    Peón Quirós, Miguel
    IMDEA Networks Institute, Spain.
    Mancuso, Vincenzo
    IMDEA Networks Institute, Spain.
    Hirsch, Thomas
    Celerway AS, Norway.
    Dély, Tobias
    Celerway AS, Norway.
    Werme, Jonas
    Celerway AS, Norway.
    Evensen, Kristian
    Celerway AS, Norway.
    Hansen, Audun
    Celerway AS, Norway.
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Karlsson, Jonas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Safari Khatouni, Ali
    Politecnico di Torino.
    Mellia, Marco
    Politecnico di Torino.
    Ajmone Marsan, Marco
    Politecnico di Torino.
    Monno, Roberto
    Nextworks, Italy.
    Lønsethagen, Håkon
    Telenor R&D, Norway.
    MONROE, a distributed platform to measure and assess mobile broadband networks2016In: Proceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation, and Characterization, New York, NY, USA: ACM Digital Library, 2016Conference paper (Refereed)
    Abstract [en]

    This demo presents the MONROE distributed platform and how it can be used to implement measurement and assessment experiments with operational mobile broadband networks (MBBs). MONROE provides registered experimenters with open access to hundreds of nodes, distributed over several European countries and equipped with multiple MBB connections, and a backend system that collects the measurement results. Experiments are scheduled through a user-friendly web client, with no need to directly access the nodes. The platform further embeds tools for real-time traffic flow analysis and a powerful visualization tool.

  • 30.
    Alay, Özgü
    et al.
    Simula Research Laboratory, Norway.
    Lutu, Andra
    Simula Research Laboratory, Norway.
    Rafael, García
    IMDEA Networks Institute, Spain.
    Peón Quirós, Miguel
    IMDEA Networks Institute, Spain.
    Mancuso, Vincenzo
    IMDEA Networks Institute, Spain.
    Hirsch, Thomas
    Celerway AS, Norway.
    Tobias, Dély
    Celerway AS, Norway.
    Werme, Jonas
    Celerway AS, Norway.
    Evensen, Kristian
    Celerway AS, Norway.
    Fosselie Hansen, Audun
    Celerway AS, Norway.
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Karlsson, Jonas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Safari Khatouni, Ali
    Politecnico di Torino, Italy.
    Mellia, Marco
    Politecnico di Torino, Italy.
    Ajmone Marsan, Marco
    Politecnico di Torino & IMDEA Networks, Italy.
    Monno, Roberto
    Nextworks, Italy.
    Lønsethagen, Håkon
    Telenor R&D, Norway.
    Measuring and Assessing Mobile Broadband Networks with MONROE2016In: 2016 IEEE International Symposium on a World of Wireless, Mobile, and Multimedia Networks (WoWMoM), Red Hook: IEEE conference proceedings, 2016Conference paper (Refereed)
    Abstract [en]

    Mobile broadband (MBB) networks underpin numerous vital operations of the society and are arguably becoming the most important piece of the communications infrastructure. In this demo paper, our goal is to showcase the potential of a novel multi-homed MBB platform for measuring, monitoring and assessing the performance of MBB services in an objective manner. Our platform, MONROE, is composed of hundreds of nodes scattered over four European countries and a backend system that collects the measurement results. Through a user-friendly web client, the experimenters can schedule and deploy their experiments. The platform further embeds traffic analysis tools for real-time traffic flow analysis and a powerful visualization tool.

  • 31. Albert, Lars
    et al.
    Fredriksson, Odd
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Information Systems and Project Management.
    Effektivisering av golvbranschen. En studie av struktur och lönsamhet samt några idéer till förändringar1986Report (Refereed)
  • 32.
    Alfredsson, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    A Cross-Layer Perspective on Transport Protocol Performance in Wireless Networks2012Doctoral thesis, monograph (Other academic)
    Abstract [en]

    Communication by wireless technologies has seen a tremendous growth in the last decades. Mobile phone technology and wireless broadband solutions are rapidly replacing the last-hop wireline connectivity for telephones and Internet access.  Research has, however, shown that Internet traffic can experience a performance degradation over wireless compared to wired networks.  The inherent properties of radio communication lead to a higher degree of unreliability, compared to communication by wire or fiber.  This can result in an increased amount of transmission errors, packet loss, delay and delay variations, which in turn affect the performance of the main Internet transport protocols TCP and UDP.  This dissertation examines the cross-layer relationship between wireless transmission and the resulting performance on the transport layer. To this end, experimental evaluations of TCP and UDP over a wireless 4G downlink system proposal are performed.  The experiment results show, in a holistic scenario, that link-level adaptive modulation, channel prediction, fast persistent link retransmissions, and channel scheduling, enables the transport protocols TCP and UDP to perform well and utilize the wireless link efficiently.  Further, a novel approach is proposed where a modified TCP receiver can choose to accept packets that are corrupted by bit errors. Results from network emulation experiments indicate that by accepting and acknowledging even small amounts of corrupted data, a much higher throughput can be maintained compared to standard TCP.

  • 33. Ali Yahiya, Tara
    et al.
    Chaouchi, Hakima
    Kassler, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Pujolle, Guy
    Seamless Interworking of WLAN and WMAN Wireless Networks2006Conference paper (Refereed)
    Abstract [en]

    Future network environments will be heterogeneous and mobile terminals will have the opportunity to dynamically select among many different access technologies. Therefore, it is important to provide service continuity in case of vertical handovers when terminals change the access technology. Two important wireless access technologies are WLAN (Wireless Local Access Networks) and WMAN (Wireless Metropolitan Access Networks) networks. In this paper, we address several challenges related to a seamless integration of those technologies. We highlight important aspects for designing a WLAN/WMAN interworking architecture and we address important Quality of Service (QoS) issues for such interworked systems like degree of QoS support provided by the technologies, QoS mapping and signalling for vertical handover. By formulating several interworking scenarios, where WLAN users with ongoing voice, video and data sessions hand over to WMAN, we study QoS and performance issues and analyse feasibility of seamless session continuity through simulations

  • 34.
    Al-Khalaf, Bara
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School.
    Medborgarnas behov av vad som kommuniceras på kommunens Facebook sida: En fallstudie på Grums kommun och Karlstads kommun2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Sociala medier ger oss en möjlighet att kommunicera med varandra och sprida information till tusentals människor samtidigt. Idag använder båda privatpersoner och organisationer sig av sociala medier, även kommuner finns idag på sociala medier för bland annat sprida information och kommunicera med medborgarna. Syftet med denna uppsats är att ta reda på medborgarnas önskemål om vad kommunen bör använda Facebook till/hur. Men även ta reda om det stämmer överrens med vad kommunen publicerar idag eller inte. Detta ger kommunen en bild av vad medborgaren är intresserade av att se på deras Facebooksida.Studien baseras på två metoder, den ena metoden är en webbaserad enkätundersökning där 32 deltagare från Karlstads universitet besvarar frågorna med egna ord. Frågorna i enkäten är fördefinerade och hjälper med att besvara uppsatsens syfte. Den andra metoden är en liten dataanalys av Karlstads och Grums kommuns Facebook sida för att kartlägga vad kommunerna publicerar idag. Undersökningen visar att medborgaren är intresserade av att se mer information om vad som händer i kommunen, om olika event och hur kommunen jobbar. Medborgaren vill också ta del av de olika besluten som tas i kommunen. Kommunen publicerar idag till vis del det medborgaren är intresserad av men medborgaren vill att kommunen visar mer delaktighet, att svara och delta aktivt i kommentarerna som medborgaren ger på kommunens inlägg.

  • 35. Allman, Mark
    et al.
    Avrachenkov, Konstatin
    Ayesta, Urtzi
    Blanton, Josh
    Hurtig, Per
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Early Retransmit for TCP and SCTP2008Other (Other (popular science, discussion, etc.))
    Abstract [en]

    This document proposes a new mechanism for TCP and SCTP that can be used to recover lost segments when a connection's congestion window is small. The "Early Retransmit" mechanism allows the transport to reduce, in certain special circumstances, the number of duplicate acknowledgments required to trigger a fast retransmission. This allows the transport to use fast retransmit to recover packet losses that would otherwise require a lengthy retransmission timeout.

  • 36.
    Almgren, Mats
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Hansen, Erik
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Coridendro: Ett verktyg för att grafiskt åskådliggöra incidensen av malignt melanom inom olika släkter2006Independent thesis Basic level (professional degree), 10 points / 15 hpStudent thesis
    Abstract [en]

    The county council of Värmland is taking part in a larger project which in general consists of surveying malign melanoma within different families. Counties in Sweden are following-up on patients suffering from malign melanoma, which is likely to have inheritable causes. When a suspected heritable malign melanoma is found an investigation is started. A pedigree is drawn, describing the propositus’ family.

    Every individual in the pedigree is represented by a symbol. The appearance of this symbol is determined by: unhealthy/healthy, diseased/alive, man/woman. When the individuals have been identified and the according symbols drawn, the symbols are connected by lines representing kinship.

    Today the pedigrees are drawn by hand using pen and paper. This is a time consuming task and the appearance differ depending on who is drawing the pedigree.

    The result of our problem-analysis is a graphical software tool. On a drawing area the user may draw the symbols on predefined locations. The tool also allows for symbols to be connected with lines. Symbols are connected through selecting a start-symbol and an end-symbol.

  • 37. Almén, Örjan
    et al.
    Malmén, Emma
    Framgångsfaktorer och fallgropar vid implementation av webbhandel: - En fallstudie av fyra företag i Värmland2012Student thesis
    Abstract [sv]

    E-handeln ökar stadigt enligt flera gjorda undersökningar, och fler och fler företag ansluter sig till elektronisk handel och framförallt webbhandel. Att införa e-handel kan ge många positiva effekter på företag genom en ökad kundkrets, minskade kostnader för lagerhållning och administrativt arbete. Vi har valt att undersöka olika faktorer som kan påverka en lyckad Implementation av e-handel, och detta har gjorts dels genom att söka i litteratur och artiklar samt att vi genomfört en fallstudie på fyra olika företag i Värmland. Vår studie bygger på en teoretisk och en empirisk del och vi har funnit flera framgångsfaktorer och fallgropar, som kan påverka implementationen av e-handel. Vi har genom fallstudierna identifierat att tre av de fyra företagen redan innan implementationen av webbhandel haft en befintlig kundkrets, vilket de ansåg vara en framgångsfaktor, något som vi däremot inte funnit i teorin. Det finns också tydliga fördelar med ett färdigintegrerat affärssystem, men som vi heller inte identifierat i de studerade källorna. En av de identifierade fallgroparna är att om kommunikationen med sin systemleverantör är undermålig kan det leda till längre utvecklingstid och missförstånd.

  • 38.
    Andersson, Carin
    et al.
    Karlstad University.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Kartläggning och analys av projektledarkompetens i forskningsprojekt vid Karlstads universitet2007Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Research at universities is today often conducted as projects. This is especially true in the engineering, natural science, medicine, and social science disciplines. Research projects are typically carried out by different categories of employers, such as professors, associate professors, assistant professors, and PhD students. These projects are typically managed by the person that applied for the project money, or the person that is the most experienced researcher at the department, which is often a professor or associate professor. From such leading persons, miracles are expected. Except acting as project managers, they are also engaged in many other parallel activities, e.g., supervision of PhD students, undergraduate and graduate education, conference organization and administration, project application writing, and representing the department internally as well as externally.

    In this report, a survey of project management competence within research projects at Karlstad University is presented. Empirical data have been gathered through two questionnaires and six complementary interviews. Professors and associate professors as well as PhD students have participated in the study. The survey shows that the active project managers have learned to lead projects based on experience and very few project managers have a formal leadership education. This implies that long stablished project management methods and tools are seldom used.

    Based on the outcome from the survey and our own observations, four concrete activities to improve project management skills are proposed in the report. The first activity is to provide a suitable and well-balanced course in project management methods that is offered to both active and future project managers. The second activity is to establish experience networks among active project mangers at Karlstad University. The third activity is to create a mentor program for new project managers. The fourth activity is to establish a group of experienced project managers that can assist in and give support to ongoing and planned projects.

  • 39. Andersson, Carin
    et al.
    Lindskog, Stefan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Survey and Analysis of Project Management Competence within Research Projects at Karlstad University2007Other (Other (popular science, discussion, etc.))
    Abstract [en]

    Research at universities is today often conducted as projects. This is especially true in the engineering, natural science, medicine, and social science disciplines. Research projects are typically carried out by different categories of employers, such as professors, associate professors, assistant professors, and PhD students. These projects are typically managed by the person that applied for the project money, or the person that is the most experienced researcher at the department, which is often a professor or associate professor. From such leading persons, miracles are expected. Except acting as project managers, they are also engaged in many other parallel activities, e.g., supervision of PhD students, undergraduate and graduate education, conference organization and administration, project application writing, and representing the department internally as well as externally.



    In this report, a survey of project management competence within research projects at Karlstad University is presented. Empirical data have been gathered through two questionnaires and six complementary interviews. Professors and associate professors as well as PhD students have participated in the study. The survey shows that the active project managers have learned to lead projects based on experience and very few project managers have a formal leadership education. This implies that long established project management methods and tools are seldom used.



    Based on the outcome from the survey and our own observations, four concrete activities to improve project management skills are proposed in the report. The first activity is to provide a suitable and well-balanced course in project management methods that is offered to both active and future project managers. The second activity is to establish experience networks among active project mangers at Karlstad University. The third activity is to create a mentor program for new project managers. The fourth activity is to establish a group of experienced project managers that can assist in and give support to ongoing and planned projects.

  • 40. Andersson, Christer
    Design and Evaluation of anonymity Solutions for Mobile Networks2008Doctoral thesis, monograph (Other academic)
  • 41.
    Andersson, Christer
    Karlstad University, Faculty of Economic Sciences, Communication and IT.
    Design and Evaluation of Anonymity Solutions for Mobile Networks2007Doctoral thesis, comprehensive summary (Other scientific)
    Abstract [en]

    Internet and mobile communications have had a profound effect on today's society. New services are constantly being deployed, in which personal data are being processed in return for personally tailored services. While mobile networks lay the groundwork for new innovative services, at the same time they pose numerous privacy challenges. There is the risk that honest citizens participating in mobile communications will have their privacy invaded for "the greater good". We argue that it is highly important that individuals are empowered to retain control over their personal spheres. Thus, the goal of this thesis is to design and evaluate anonymous overlay networks} adapted for mobile networks that allow users to control which information leaves their personal spheres in a mobile communication.

    Technically, by using an anonymous overlay network, users can communicate with their communication partners without disclosing their network identities. In this thesis, we propose three different anonymous overlay networks tailored for mobile networks. First, two approaches are proposed for anonymous browsing on the mobile Internet, namely mCrowds and a Tor-based approach. By applying theoretical analysis and\,/\,or practical experiments, we show that these approaches offer an appropriate trade-off between the offered degree of anonymity and performance loss. Second, an anonymous overlay network for use in mobile ad hoc networks - Chameleon - is suggested.

    Besides the actual design of these anonymous overlay networks, this thesis provides novel contributions in other essential areas of privacy protection and anonymous communication. First, also non-technical aspects of privacy protection are thoroughly discussed, including legal, social, and user interface aspects. Second, we survey existing metrics for quantifying anonymity and also propose new ideas regarding anonymity metrics. Third, we review and classify existing mechanisms for anonymous communication in mobile ad hoc networks. Lastly, we also propose a cryptographic technique for building up the user base of an anonymous overlay network in a secure and privacy-friendly manner.

  • 42.
    Andersson, Christer
    Karlstad University, Division for Information Technology.
    Enhancing Privacy for Mobile Networks: Examples of Anonymity Solutions and Their Analysis2005Licentiate thesis, comprehensive summary (Other scientific)
    Abstract [en]

    Internet and mobile communications have had a profound effect on today’s society. New services are constantly being deployed, in which an increasing amount of personal data is being processed in return for personally tailored services. Further, the use of electronic surveillance is increasing. There is the risk that honest citizens will have their privacy invaded for “the greater good”. We argue that it is of uttermost importance to retain the individuals’ control over their personal spheres.

    One approach for enhancing the users’ privacy is to deploy technical measures for safeguarding privacy, so-called Privacy-Enhancing Technologies (PETs). This thesis examines a set of PETs for enabling anonymous communication, so-called anonymous overlay networks,which eliminate the processing of personal data altogether by allowing the users act anonymously when communicating in a networked environment.

    This thesis focuses mainly on mobile networks. These are of great interest because on the one hand they lay the groundwork for new innovative applications, but on the other hand they pose numerous novel challenges to privacy. This thesis describes the implementation

    and performance evaluation of mCrowds – an anonymous overlay network for mobile Internet that enables anonymous browsing. It also describes the ongoing investigation on how to design anonymous overlay networks in order to make them suitable for mobile ad hoc

    networks, a required building block for ambient intelligence.

  • 43. Andersson, Christer
    Enhancing Privacy in Mobile Networks: Anonymity Solutions and Their Analysis2005Licentiate thesis, monograph (Other academic)
  • 44.
    Andersson, Christer
    et al.
    Karlstad University, Division for Information Technology.
    Camenisch, Jan
    IBM Zurich Research Laboratory, Switzerland.
    Crane, Stephen
    Hewlett-Packard Laboratories, UK.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology.
    Leenes, Ronald
    Tilburg University, the Netherlands.
    Pearson, Siani
    Hewlett-Packard Laboratories, UK.
    Pettersson, John Sören
    Karlstad University, Division for Information Technology.
    Sommer, Dieter
    IBM Zurich Research Laboratory, Switzerland.
    Trust in PRIME2005In: Proceedings of the 5th IEEE International Symposium on Signal Processing and IT, IEEE conference proceedings, 2005, 552-559 p.Conference paper (Other academic)
    Abstract [en]

    The PRIME project develops privacy enhancing identity management systems that allow users in various application areas such as e-commerce to regain control over their personal spheres. This paper introduces the PRIME technical architecture that also includes special trust-enhancing mechanisms, and shows how PRIME technologies can enhance privacy and trust of e-shopping customers. It also discusses the socio-psychological factors and HCI aspects influencing the end user's trust in privacy enhancing identity management, and shows why HCI research, user studies, and socio-psychological research, are necessary efforts to accompany system design.

  • 45. Andersson, Christer
    et al.
    Fischer Hübner, Simone
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Lundin, Reine
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Enabling anonymity for the mobile Internet using the mCrowds system2004In: Risk and Challenges of the Network Society: Proceedings of the Second IFIP WG 9.2, 9.6/11.6, 11.7 International Summer School / [ed] Penny Duquenoy, Simone Fischer-Hübner, Jan Holvast, and Albin Zuccato, Karlstad University Press, 2004, 178-189 p.Chapter in book (Refereed)
    Abstract [en]

    The mobile Internet is a fast growing technology that introduces new privacy risks. We argue that, since privacy legislation alone is not sufficient to protect the users privacy, technical solutions to enhanceinformational privacy of individuals are also needed. This paper introduces mCrowds, a privacy-enhancing technology that combines the concept of a crowd system in a mobile Internet setting with a filteringfunctionality to enable anonymity towards the content providers

  • 46.
    Andersson, Christer
    et al.
    Karlstad University, Division for Information Technology.
    Fischer-Huebner, Simone
    Karlstad University, Division for Information Technology.
    Lundin, Reine
    Karlstad University, Division for Information Technology.
    Enabling Anonymity for the Mobile Internet Using the mCrowds System2003In: Risk and Challenges of the Network Society: Proceedings of the IFIP WG 9.2, 9.6/11.7 Summer School 4-8 August 2003. / [ed] Penny Duquennoy, Simone Fischer-Hübner, Jan Holvast & Albin Zuccato, Karlstad: Karlstads universitet , 2003Conference paper (Refereed)
  • 47.
    Andersson, Christer
    et al.
    Karlstad University, Division for Information Technology.
    Fischer-Hübner, Simone
    Karlstad University, Division for Information Technology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Lundin, Reine
    Karlstad University, Division for Information Technology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    mCrowds: Anonymity for the Mobile Internet2003In: HumanIT 2003, Karlstad: Karlstad University Press, 2003, 79-92 p.Chapter in book (Refereed)
  • 48. Andersson, Christer
    et al.
    Kohlweiss, Markulf
    Martucci, Leonardo
    Panchenko, Andryi
    A Self-Certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup2008Conference paper (Refereed)
    Abstract [en]

    An attacker who can control arbitrarily many user identities can break the security properties of most conceivable systems. This is called a Sybil attack. We present a solution to this problem that does

    not require online communication with a trusted third party and that in addition preserves the privacy of honest users. Given an initial so-called Sybil-free identity domain, our proposal can be used for deriving Sybil-free unlinkable pseudonyms associated with other identity domains. The pseudonyms are self-certified and computed by the users themselves from their cryptographic long-term identities

  • 49. Andersson, Christer
    et al.
    Lundin, Reine
    On the Fundamentals of Anonymity Metrics2008In: The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/ 11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden, August 4-10 2007 / [ed] Simone Fischer-Hübner, Penny Duquenoy, Albin Zuccato and Leonardo Martucci, Springer-Verlag New York, 2008, 325-341 p.Chapter in book (Refereed)
  • 50. Andersson, Christer
    et al.
    Lundin, Reine
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    On the Fundamentals of Anonymity Metrics2007In: The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/ 11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society / [ed] Simone Fischer-Hübner, Penny Duquenoy, Albin Zuccato and Leonardo Martucci, 2007Conference paper (Refereed)
1234567 1 - 50 of 1841
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf