Essays about: "Authentication Techniques"

Showing result 1 - 5 of 40 essays containing the words Authentication Techniques.

  1. 1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Fawad Ahmad; [2024]
    Keywords : ;

    Abstract : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. READ MORE

  2. 2. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gatien Ducornaud; [2023]
    Keywords : Role Based Access Control RBAC ; Cybersecurity; Smart Grid; Substation; Desktop Applications; Contrôle d’accès basé sur les rôles RBAC ; Cybersécurité; Réseau électrique intelligent; Sous-Station; Application Desktop; Rollbaserad åtkomstkontroll RBAC ; Cybersäkerhet; Smarta nät; Transformatorstation; datorapplikation;

    Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE

  3. 3. Acceptance of Biometric Systemsfor User Authentication and Identification

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Mymoon Dobaibi; [2023]
    Keywords : Biometrics Acceptance; Authentication Techniques; User Preferences; Preferred Techniques; User Experiences; User Perception.;

    Abstract : Biometric systems have become increasingly popular for user authentication andidentification across various domains, including smartphones, laptops, financial services,healthcare, and security. These systems offer enhanced security and quickaccess to data, aiming to address the challenges associated with passwords and pins. READ MORE

  4. 4. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lukas Einler Larsson; Kushtrim Qollakaj; [2023]
    Keywords : Cybersecurity; Remote work; VPN; Exploit; Hardening;

    Abstract : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. READ MORE

  5. 5. The trends in the offline password-guessing field : Offline guessing attack on Swedish real-life passwords

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Yasser Zarzour; Mohamad Alchtiwi; [2023]
    Keywords : Password security; password-guessing tool; password-guessing method; password-guessing technique; offline attack; Swedish password leak; Lösenordssäkerhet; lösenordsgissningsverktyg; lösenordsgissningsmetoder; lösenordsgissningstekniker; offline attack; svenska lösenordsläckor;

    Abstract : Password security is one of the most critical aspects of IT security, as password-based authentication is still the primary authentication method. Unfortunately, our passwords are subject to different types of weaknesses and various types of password-guessing attacks. READ MORE