Advanced search

Showing result 1 - 5 of 15 essays matching the above criteria.

  1. 1. Authentication challenges for people with neurodevelopmental disorders

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Patryk Chrzan; [2023]
    Keywords : Authentication; passwords; neurodevelopmental disorders; cybersecurity; disabilities; Autentisering; lösenord; neuropsykiatriska funktionsnedsättningar; datasäkerhet; funktionshinder;

    Abstract : We live in a world where we increasingly depend on information technology, as much of our work and education occurs online, often from home. An average user has an increasing amount of accounts for all kinds of online services, making authentication more and more important. READ MORE

  2. 2. Building Blocks for a Better Buyer Experience: Consumer Perceptions of Blockchain Authentication Methods in Second-Hand Luxury E-Commerce

    University essay from Lunds universitet/Företagsekonomiska institutionen

    Author : Katie Fajer; Lisa Alm; Amanda Gerth; [2023]
    Keywords : Second-hand luxury e-commerce; Blockchain technology; Authentication; Perceived Risk; Theory of Planned Behaviour; Consumer Behaviour.; Business and Economics;

    Abstract : Title: Building Blocks for a Better Buyer Experience: Consumer Perceptions of Blockchain Authentication Methods in Second-Hand Luxury E-Commerce Date of the Seminar: 2nd of June, 2023 Course: BUSN39: Degree Project in Global Marketing Authors: Lisa Alm, Amanda Gerth & Katie Fajer Supervisor: Burak Tunca Keywords: Second-hand luxury e-commerce, Blockchain technology, Authentication, Perceived Risk, Theory of Planned Behaviour, Consumer Behaviour. Thesis Purpose: To explore consumer perspectives towards the implementation blockchain technology as a service offered within the authentication of second-hand vintage luxury e-commerce Methodology: This quantitative research study utilises an independent sample t-test to compare Perceived Risk, Attitudes, Perceived Behavioural Control, Subjective Norms, and Purchase Intention in regard to authentication method surveyed. READ MORE

  3. 3. Writer identification using semi-supervised GAN and LSR method on offline block characters

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Adrian Hagström; Rustam Stanikzai; [2020]
    Keywords : Computer vision; Deep learning; GAN; Generative adveserial network; Semi-supervised learning; LSR; Machine learning; ResNet; AI; Writer authentication; Writer identification; Datorseende; Djup lärning; GAN; Maskininlärning; AI; Skrvning autentisering; Skrvning identifiering;

    Abstract : Block characters are often used when filling out forms, for example when writing ones personal number. The question of whether or not there is recoverable, biometric (identity related) information within individual digits of hand written personal numbers is then relevant. READ MORE

  4. 4. A roadmap for ensuring SAML authentication using Identity server for on- premises and cloud

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Triveni Kodam; [2019]
    Keywords : SAML; IDP; IAM; Identity server; SP;

    Abstract : Cloud-based applications especially SaaS applications have become essential for startups and various sized businesses. Adapting to these web applications helps to reduce operational costs and further provide flexibility in accessing individual data of the users. READ MORE

  5. 5. Feature Analysis in Online Signature Verification on Digital Whiteboard : An analysis on the performance of handwritten signature authentication using local and global features with Hidden Markov models

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Simon Olander Sahlén; [2018]
    Keywords : signature; machine learning; hmm; online; verification; hidden markov model; whiteboard; wall; wallrite; hand written; written;

    Abstract : The usage of signatures for authentication is widely accepted, and remains one of the most familiar biometric in our society. Efforts to digitalise and automate the verification of these signatures are hot topics in the field of Machine Learning, and a plethora of different tools and methods have been developed and adapted for this purpose. READ MORE