Essays about: "Authentication mobile application"
Showing result 1 - 5 of 34 essays containing the words Authentication mobile application.
-
1. Swift vs React Native : A performance comparison for automatization of gamification using QR-codes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the world of mobile applications, there is no lack of frameworks and languages to use for development. One of the most used frameworks is React Native, which builds on React for web browsers. The React Native framework allows the developer to write the application in JavaScript, and run the application on iOS or Android devices. READ MORE
-
2. Women's perceived security in shared autonomous vehicles : The impact of identifying co-passengers
University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronikAbstract : The present thesis aims to establish ideas and technical solutions that can have a positive impact on women's perceived safety while traveling in autonomous vehicles, made for sharing with strangers. The method follows the Design Thinking model which contributes to a user-centered design approach. READ MORE
-
3. Fuzzing of PKCS#11 Trusted Application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE
-
4. Ethical hacking of a Smart Wi-Fi Plug
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This bachelor’s thesis paper investigates the security of a smart Wi-Fi plug a power outlet remotely controlled by a smart phone, the Deltaco Smart Home SH-P01. In order to raise the security standards of the numerous new digital products produced every year, the possible security flaws of these devices must be exposed and made official to the general public. READ MORE
-
5. Password protection by analyzed keystrokes : Using Artificial Intelligence to find the impostor
University essay fromAbstract : A literature review was done to find that there are still issues with writing passwords. From the information gathered, it is stated that using keystroke characteristics could have the potential to add another layer of security to compromised user accounts. READ MORE