Essays about: "CREDENTIAL"
Showing result 6 - 10 of 17 essays containing the word CREDENTIAL.
-
6. An educational experiment in discovering spear phishing attacks
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Spear phishing attacks uses social engineering targeting a specific person to steal credential information or infect the users computer with malware. It is often done through emails and it can be very hard to spot the difference between a legitimate email and a scam email. READ MORE
-
7. ROI Calculation on Online Controlled Experiment
University essay from Lunds universitet/Matematisk statistikAbstract : As online services such as e-commerce and mobile applications keeps growing, the need of optimizing the user experience does as well. By conducting Online Controlled Experiments, companies can get an insight to which features, design choices and implementations that users enjoy the most. READ MORE
-
8. Usability and pilot tests on privacy dialogues : Evaluation of prototypes for data sharing online
University essay from Karlstads universitet/Handelshögskolan (from 2013)Abstract : This study aims to investigate what can be done to make internet users more aware of what information they share with service providers, as well as to serve as a pilot test for two prototypes as a part of a EU funded project called CREDENTIAL. For these tests 12 participants were recruited. READ MORE
-
9. Accessibility Evaluation of a Mobile Application Using WCAG 2.0 : An Evaluation of the CREDENTIAL Project’s Mobile Application UI V2
University essay from Karlstads universitet/Handelshögskolan (from 2013)Abstract : .... READ MORE
-
10. A secure multi-party scheme with certificateless cryptography for secret key extraction
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Many systems contain sensitive data such as user credentials used for authentication purposes. For large systems, a common approach is to store the data in a configuration file at a trusted third party. However, that would imply a single point of failure if an adversary gains access to the trusted party. READ MORE