Essays about: "Autentisering"

Showing result 21 - 25 of 80 essays containing the word Autentisering.

  1. 21. Evaluating APS Ecosystem Security : Novel IoT Enabled Medical Platform for Diabetes Patients

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Batuhan Ceylan; [2020]
    Keywords : security; medical device; penetration testing; web application; IoT; säkerhet; medicinsk IoT; penetrationstest; webbapplikation;

    Abstract : Computing technology has been getting more reliable and cheaper every year for the past several decades. Consequently, IoT devices have now become a part of medical technology. One example of this is a new open-source technology that has emerged for type-1 diabetes patients, which regulates the patients’ blood glucose levels. READ MORE

  2. 22. Adversarial Attacks against Behavioral-based Continuous Authentication

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Maciej Kufel; [2020]
    Keywords : ;

    Abstract : Online identity theft and session hijacking attacks have become a major hazardin recent years and are expected to become more frequent in the years to come.Unlike the traditional authentication methods, continuous authentication based onthe characterization of user behavior in interactions with the computer system allowsto continuously verify the user’s identity and mitigates the risk of such forms ofmalicious access. READ MORE

  3. 23. Blockchain technology in the future Swedish electricity system : An exploratory study and multi-level perspective analysis of blockchain in the energy transition in Sweden

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Saga Carle; Viktor Vifell Nilsson; [2020]
    Keywords : ;

    Abstract : Blockchain, a distributed ledger technology, became publicly known when the cryptocurrency Bitcoin was introduced in 2009. As the financial value of cryptocurrencies increased, the interest for blockchain grew, leading other sectors to explore if blockchain could be used in other areas as well. READ MORE

  4. 24. Authentication and Identification of Sensor Nodes to Avoid Unauthorized Access in Sensor Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Michael Henriksson; [2020]
    Keywords : Sensor network; Key distribution center; Zigbee; CHAP; Device authentication; Sensornätverk; Key distribution center; Zigbee; CHAP; Autentisering;

    Abstract : With the increasing popularity of Internet of Things (IoT), network connected devices and sensors, to easier collect data is security an aspect that must not be forgotten. When sensitive data, such as personal or private data, is sent over the network without protection can it easier be obtained by anyone who want to get their hands on it. READ MORE

  5. 25. Gait verification using deep learning models, accelerometers and gyroscope data

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erifili Ichtiaroglou; [2020]
    Keywords : ;

    Abstract : Biometrical authentication systems, with its advantages over the traditional methods such as tokens and cards combined with secret passwords and pins, are becoming popular these days. In addition recent advances in machine learning helped improve the performance of biometrical systems, that can now be used commercially. READ MORE