Essays about: "Authentication mobile application"

Showing result 1 - 5 of 34 essays containing the words Authentication mobile application.

  1. 1. Swift vs React Native : A performance comparison for automatization of gamification using QR-codes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Farzaneh Tajik; Josefin Lindström; [2023]
    Keywords : React Native; Swift; cross platform; iOS; automatization; gamification; Swift; React Native; plattformsoberoende; iOS; spelifiering; automatisering;

    Abstract : In the world of mobile applications, there is no lack of frameworks and languages to use for development. One of the most used frameworks is React Native, which builds on React for web browsers. The React Native framework allows the developer to write the application in JavaScript, and run the application on iOS or Android devices. READ MORE

  2. 2. Women's perceived security in shared autonomous vehicles : The impact of identifying co-passengers

    University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronik

    Author : Emma Sundin; [2022]
    Keywords : Shared Autonomous Vehicles; Ride-sharing; Women s Security; Trust; User Authentication; Mobility;

    Abstract : The present thesis aims to establish ideas and technical solutions that can have a positive impact on women's perceived safety while traveling in autonomous vehicles, made for sharing with strangers. The method follows the Design Thinking model which contributes to a user-centered design approach. READ MORE

  3. 3. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  4. 4. Ethical hacking of a Smart Wi-Fi Plug

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Markus Newton Hedelin; Marcus Samuelsson; [2022]
    Keywords : Bachelor’s thesis; Ethical hacking; Penetration testing; Internet of things; Smart plug; Mobile application; Cloud service; Kandidatexamensarbete; Etisk hackning; Penetrationstestning; Sakernas internet; Smart uttag; Mobilapplikation; Molntjänst;

    Abstract : This bachelor’s thesis paper investigates the security of a smart Wi-Fi plug a power outlet remotely controlled by a smart phone, the Deltaco Smart Home SH-P01. In order to raise the security standards of the numerous new digital products produced every year, the possible security flaws of these devices must be exposed and made official to the general public. READ MORE

  5. 5. Password protection by analyzed keystrokes : Using Artificial Intelligence to find the impostor

    University essay from

    Author : Robert Danilovic; Måns Svensson; [2021]
    Keywords : Keystroke dynamics; Password security; Artificial Intelligence; Mobile application; Neural network; SVM; Gyroscope; Typing Characteristics;

    Abstract : A literature review was done to find that there are still issues with writing passwords. From the information gathered, it is stated that using keystroke characteristics could have the potential to add another layer of security to compromised user accounts. READ MORE