Essays about: "Autentisering"

Showing result 1 - 5 of 61 essays containing the word Autentisering.

  1. 1. Formal security analysis of authentication in an asynchronous communication model

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jacob Wahlgren; Sam Yousefzadegan Hedin; [2020]
    Keywords : formal verification; Tamarin Prover; formal analysis; information security; authentication; formell verifiering; Tamarin Prover; formell analys; informationssäkerhet; autentisering;

    Abstract : Formal analysis of security protocols is becoming increasingly relevant. In formal analysis, a model is created of a protocol or system, and propositions about the security of the model are written. A program is then used to verify that the propositions hold, or find examples of where they do not. READ MORE

  2. 2. Ethical Hacking Of An Industrial Control System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Daniel Conde Ortiz; [2020]
    Keywords : ;

    Abstract : Almost no software is exempt of vulnerabilities. Penetration testing or ethicalhacking can be used to identify them. This thesis conducts a series of testsfollowing the penetration testing method on a large scale industrial controlsystem. READ MORE

  3. 3. Adversarial Attacks against Behavioral-based Continuous Authentication

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Maciej Kufel; [2020]
    Keywords : ;

    Abstract : Online identity theft and session hijacking attacks have become a major hazardin recent years and are expected to become more frequent in the years to come.Unlike the traditional authentication methods, continuous authentication based onthe characterization of user behavior in interactions with the computer system allowsto continuously verify the user’s identity and mitigates the risk of such forms ofmalicious access. READ MORE

  4. 4. Blockchain technology in the future Swedish electricity system : An exploratory study and multi-level perspective analysis of blockchain in the energy transition in Sweden

    University essay from KTH/Skolan för industriell teknik och management (ITM); KTH/Skolan för industriell teknik och management (ITM)

    Author : Saga Carle; Viktor Vifell Nilsson; [2020]
    Keywords : ;

    Abstract : Blockchain, a distributed ledger technology, became publicly known when the cryptocurrency Bitcoin was introduced in 2009. As the financial value of cryptocurrencies increased, the interest for blockchain grew, leading other sectors to explore if blockchain could be used in other areas as well. READ MORE

  5. 5. Authentication and Identification of Sensor Nodes to Avoid Unauthorized Access in Sensor Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Michael Henriksson; [2020]
    Keywords : Sensor network; Key distribution center; Zigbee; CHAP; Device authentication; Sensornätverk; Key distribution center; Zigbee; CHAP; Autentisering;

    Abstract : With the increasing popularity of Internet of Things (IoT), network connected devices and sensors, to easier collect data is security an aspect that must not be forgotten. When sensitive data, such as personal or private data, is sent over the network without protection can it easier be obtained by anyone who want to get their hands on it. READ MORE