Essays about: "CREDENTIAL"

Showing result 6 - 10 of 17 essays containing the word CREDENTIAL.

  1. 6. An educational experiment in discovering spear phishing attacks

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Sebastian Floderus; Linus Rosenholm; [2019]
    Keywords : Phishing; Spear-phishing; Experiment; Security awareness;

    Abstract : Background: Spear phishing attacks uses social engineering targeting a specific person to steal credential information or infect the users computer with malware. It is often done through emails and it can be very hard to spot the difference between a legitimate email and a scam email. READ MORE

  2. 7. ROI Calculation on Online Controlled Experiment

    University essay from Lunds universitet/Matematisk statistik

    Author : Richard Wang; [2019]
    Keywords : A B testing; Online Controlled Experiments; Return on Investment; ROI; Mathematics and Statistics;

    Abstract : As online services such as e-commerce and mobile applications keeps growing, the need of optimizing the user experience does as well. By conducting Online Controlled Experiments, companies can get an insight to which features, design choices and implementations that users enjoy the most. READ MORE

  3. 8. Usability and pilot tests on privacy dialogues : Evaluation of prototypes for data sharing online

    University essay from Karlstads universitet/Handelshögskolan (from 2013)

    Author : Robin Nyzell; [2018]
    Keywords : ;

    Abstract : This study aims to investigate what can be done to make internet users more aware of what information they share with service providers, as well as to serve as a pilot test for two prototypes as a part of a EU funded project called CREDENTIAL. For these tests 12 participants were recruited. READ MORE

  4. 9. Accessibility Evaluation of a Mobile Application Using WCAG 2.0 : An Evaluation of the CREDENTIAL Project’s Mobile Application UI V2

    University essay from Karlstads universitet/Handelshögskolan (from 2013)

    Author : Elin Nilsson; [2018]
    Keywords : ;

    Abstract : .... READ MORE

  5. 10. A secure multi-party scheme with certificateless cryptography for secret key extraction

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dennis Fokin; [2018]
    Keywords : multi-party computation; secret sharing; certificateless cryptography; cryptography;

    Abstract : Many systems contain sensitive data such as user credentials used for authentication purposes. For large systems, a common approach is to store the data in a configuration file at a trusted third party. However, that would imply a single point of failure if an adversary gains access to the trusted party. READ MORE