Essays about: "Authentication Techniques"
Showing result 1 - 5 of 40 essays containing the words Authentication Techniques.
-
1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. READ MORE
-
2. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE
-
3. Acceptance of Biometric Systemsfor User Authentication and Identification
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Biometric systems have become increasingly popular for user authentication andidentification across various domains, including smartphones, laptops, financial services,healthcare, and security. These systems offer enhanced security and quickaccess to data, aiming to address the challenges associated with passwords and pins. READ MORE
-
4. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. READ MORE
-
5. The trends in the offline password-guessing field : Offline guessing attack on Swedish real-life passwords
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Password security is one of the most critical aspects of IT security, as password-based authentication is still the primary authentication method. Unfortunately, our passwords are subject to different types of weaknesses and various types of password-guessing attacks. READ MORE