Essays about: "Authentication"

Showing result 1 - 5 of 271 essays containing the word Authentication.

  1. 1. BankID-based Authentication for Phone Calls

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Anton Göransson; Emma Asklund; [2020]
    Keywords : Electronic identification; BankID; authentication; social engineering; phone calls; spoofing; Technology and Engineering;

    Abstract : Authentication for phone calls is important for companies with hundreds of customers wanting to access sensitive information. However, it is sub-par compared to authentication when using applications or websites. In this thesis, seven models have been developed for how to use BankID as the authentication service during phone calls. READ MORE

  2. 2. Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Nico Ferrari; [2019]
    Keywords : Internet of Things; Context-based authentication; Fuzzy commitment scheme; Cryptographic key establishment; Lightweight cryptography; Contiki; One-way accumulators;

    Abstract : The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. READ MORE

  3. 3. Vulnerability Assessment of Authentication Methods in a Large-Scale Computer System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Davis Freimanis; [2019]
    Keywords : ;

    Abstract : Vulnerabilities exist in almost all software programs. Some software is more vulnerable than others. A method that can be used to mitigate the vulnerabilities is penetration testing. In this thesis, a penetration test was conducted on a large scale computer system provided by a company. READ MORE

  4. 4. Comparison of blockchain e-wallet implementations

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Behnam Eliasi; Arian Javdan; [2019]
    Keywords : Blockchain; key storage; mobile payment; e-wallet; authentication; Blockkedja; nyckellagring; mobilbetalningar; e-plånbok; autentisering;

    Abstract : With the rise of blockchain technology and cryptocurrency, secure e-wallets also become more important. But what makes an e-wallet secure? In this report, we compare different aspects of ewallets to see which alternatives are secure and convenient enough to be used.This report contains comparative analyses of different implementation for e-wallets. READ MORE

  5. 5. Tiny Security : Evaluating energy   use for security in an IoT application

    University essay from Mittuniversitetet/Institutionen för data- och systemvetenskap

    Author : Mårten Söderquist; [2019]
    Keywords : Security; constrained device; AES; IoT; sensors; AEAD; ATmega1284P; ACORN128;

    Abstract : IoT devices are   increasingly used in the process of gathering scientific data. In   environmental monitoring IoT devices can be used as remote sensing devices to   collect information about e.g. temperature. READ MORE