Essays about: "content authentication"

Showing result 1 - 5 of 13 essays containing the words content authentication.

  1. 1. Fact-Finding Online – A Fair Trial Offline?

    University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Author : Disa Janfalk; [2021]
    Keywords : Law and Political Science;

    Abstract : The Office of the Prosecutor (OTP) of the International Criminal Court (ICC) faces massive evidentiary problems due to flawed state-cooperation, limited access to sites of atrocity and an insufficient budget. Meanwhile, potentially relevant digital open-source information abounds, as citizens increasingly turn to social media to spread awareness of human rights violations and possible international crimes. READ MORE

  2. 2. Content Co-creation Practices and Expressions of Authenticity on Destination Marketing Organisation’s Instagram Account

    University essay from Lunds universitet/Institutionen för tjänstevetenskap

    Author : Noora Pihlainen; [2017]
    Keywords : Image-focused Social Media; Instagram; Content Co-creation; Authenticity; Tourism Destination Marketing; Social Sciences;

    Abstract : The emergence of social media has changed the power relations and the practices of tourism destination marketing by enabling the co-existence of user generated content and destination marketing organisation’s content, as well as the content co-creation among these actors. Due to the visual nature of tourism the image-focused social media platforms are particularly interesting for the tourism field. READ MORE

  3. 3. Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Niklas Tellini; Fredrik Vargas; [2017]
    Keywords : Two-Factor Authentication; Security; One-Time Passwords; Access control; Digital Assessment Platform; Två-stegs autentisering; Säkerhet; Engångslösenord; Åtkomst kontroll; Digital bedömningsplattform;

    Abstract : Two-Factor Authentication (2FA) is a two-step verification process that aims to provide an additional layer of security by requiring the user to authenticate himself/herself using a secondary means (ownership factor or inheritance factor). Without the use of 2FA, an attacker could gain access to a person’s devices or accounts solely by knowing the victim’s password, while with 2FA knowing only this password is insufficient to pass the authentication check. READ MORE

  4. 4. Machine Learning for Text-Independent Speaker Verification : How to Teach a Machine to RecognizeHuman Voices

    University essay from KTH/Skolan för elektro- och systemteknik (EES)

    Author : Stefano Imoscopi; [2016]
    Keywords : ;

    Abstract : The aim of speaker recognition and veri cation is to identify people's identity from the characteristics of their voices (voice biometrics). Traditionally this technology has been employed mostly for security or authentication purposes, identi cation of employees/customers and criminal investigations. READ MORE

  5. 5. Privacy Ensuring SRTP for Cloud Conferencing

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Maria Haider; [2016]
    Keywords : Network Security; Semi trusted cloud conference Server; SRTP; RTP; DTLS-SRTP;

    Abstract : Multimedia conferences held using services provided by clouds owned by third party companies are becoming increasingly popular. While using such services, end users will want to keep their audio/video data private when they pass through the servers situated in the cloud. READ MORE