Advanced search

Found 4 essays matching the above criteria.

  1. 1. Password Managers in Digital Forensics

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Sascha David Hähni; [2023]
    Keywords : Digital Forensics; Password Managers; Memory Forensics; Live Forensics;

    Abstract : Digital forensics – the scientific process to draw evidence from digital devices confiscated in a criminal investigation – is constantly adapting to technological changes. A current challenge is the widespread use of encryption that makes classical data retrieval methods obsolete. READ MORE

  2. 2. E2PM: Enclosed Portable Password Manager

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Aung Naing Oo; [2022]
    Keywords : ;

    Abstract : Passwords have been a necessary evil for a while. Today’s computer users have multiple accounts on the internet, with each burdening the user’s memory with complex long passwords. READ MORE

  3. 3. Password Managers in a Home Computer Environment

    University essay from Lunds universitet/Institutionen för informatik

    Author : Emil Björk; Pontus Pieslinger; [2020]
    Keywords : Information Systems; Information Technology; Unified Theory of Acceptance and Use of Technology; Diffusion of Innovation; Password Manager.; Technology and Engineering;

    Abstract : Passwords are one of the most used tools for authentication. Because of this, password managers have been developed to allow for increased protection and usability when managing passwords. However, the research of password managers in the context of usability coupled with diffusion of technology is unclear. READ MORE

  4. 4. Cloud computing from a privacy perspective

    University essay from Institutionen för datavetenskap

    Author : Daniel Evertsson; [2013]
    Keywords : ;

    Abstract : The cloud could simplifies the everyday life of private individuals as well as big enterprises by renting out recourses. Resources such as storage capacity, computational power or cloud-based applications could be accessed without the need to invest in expensive infrastructure. READ MORE