Essays about: "Authentication"

Showing result 21 - 25 of 393 essays containing the word Authentication.

  1. 21. Acceptance of Biometric Systemsfor User Authentication and Identification

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Mymoon Dobaibi; [2023]
    Keywords : Biometrics Acceptance; Authentication Techniques; User Preferences; Preferred Techniques; User Experiences; User Perception.;

    Abstract : Biometric systems have become increasingly popular for user authentication andidentification across various domains, including smartphones, laptops, financial services,healthcare, and security. These systems offer enhanced security and quickaccess to data, aiming to address the challenges associated with passwords and pins. READ MORE

  2. 22. Swift vs React Native : A performance comparison for automatization of gamification using QR-codes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Farzaneh Tajik; Josefin Lindström; [2023]
    Keywords : React Native; Swift; cross platform; iOS; automatization; gamification; Swift; React Native; plattformsoberoende; iOS; spelifiering; automatisering;

    Abstract : In the world of mobile applications, there is no lack of frameworks and languages to use for development. One of the most used frameworks is React Native, which builds on React for web browsers. The React Native framework allows the developer to write the application in JavaScript, and run the application on iOS or Android devices. READ MORE

  3. 23. The Effect of Zero Trust Model on Organizations

    University essay from Lunds universitet/Institutionen för informatik

    Author : Umar Shahzad; Can Lu; [2023]
    Keywords : Zero Trust; Cybersecurity; Organization; Business and Economics; Social Sciences; Technology and Engineering;

    Abstract : The increase in cyber threats has prompted organizations to adopt more robust cybersecurity frameworks, such as the Zero Trust model. This study investigates the effects of implementing the Zero Trust model on organizations. READ MORE

  4. 24. Password Management : A Study about Current Challenges with Password Management

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Ali Jalali; Laila Assadi; Asma Osman; [2023]
    Keywords : Password managers; password management; password security; user behavior; authentication methods;

    Abstract : Effective password management is crucial for safeguarding online accounts and sensitive information. This research examines the current challenges and provides alternative solutions for better password management. This study encompasses a comprehensive survey and interviews conducted with individuals across various professional backgrounds. READ MORE

  5. 25. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lukas Einler Larsson; Kushtrim Qollakaj; [2023]
    Keywords : Cybersecurity; Remote work; VPN; Exploit; Hardening;

    Abstract : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. READ MORE