Search For:

Displaying 1-5 out of 5 total
Case Study: Online Banking Security
Found in: IEEE Security and Privacy
By Kjell J. Hole, Vebjørn Moen, Thomas Tjøstheim
Issue Date:March 2006
pp. 14-20
A description of attack scenarios over a two-year period illustrates several key security issues with Internet banking systems in Norway. Given the banks' security-by-obscurity policy, online customers knew little about security levels and falsely believed...
 
Building and Maintaining Trust in Internet Voting
Found in: Computer
By Lars Hopland Nestås,Kjell J. Hole
Issue Date:May 2012
pp. 74-80
Voting codes, risk analysis, and election forensics can help the public build and maintain trust in an Internet voting system by assuring that it meets important security and privacy requirements.
 
Risk Assessment of a National Security Infrastructure
Found in: IEEE Security and Privacy
By Kjell J. Hole, André N. Klingsheim, Lars-Helge Netland, Yngve Espelid, Thomas Tjøstheim, Vebjørn Moen
Issue Date:January 2009
pp. 34-41
In Norway, BankID is the banking industry's public-key infrastructure of choice for authenticating Internet customers, and it might soon become the government's national ID infrastructure as well. But do BankID's differences from standard PKIs make it a ri...
 
Open Wireless Networks on University Campuses
Found in: IEEE Security and Privacy
By Kjell J. Hole, Lars-Helge Netland, Yngve Espelid, André N. Klingsheim, Hallvar Helleseth, Jan B. Henriksen
Issue Date:July 2008
pp. 14-20
Open wireless networks raise privacy issues and entail increased risk of malicious attacks and illegal downloading activities. Such networks are nonetheless attractive—particularly to universities—because they enhance usability and thus expand access to no...
 
Securing Wi-Fi Networks
Found in: Computer
By Kjell J. Hole, Erlend Dyrnes, Per Thorsheim
Issue Date:July 2005
pp. 28-34
Hackers can decrypt and read data on a wireless link protected by built-in WEP encryption, and they may even be able to access the data on a wired network through a Wi-Fi access point. The authors assess Wi-Fi network security in one city, analyze alternat...
 
 1