Essays about: "Authentication"

Showing result 26 - 30 of 393 essays containing the word Authentication.

  1. 26. Building Blocks for a Better Buyer Experience: Consumer Perceptions of Blockchain Authentication Methods in Second-Hand Luxury E-Commerce

    University essay from Lunds universitet/Företagsekonomiska institutionen

    Author : Katie Fajer; Lisa Alm; Amanda Gerth; [2023]
    Keywords : Second-hand luxury e-commerce; Blockchain technology; Authentication; Perceived Risk; Theory of Planned Behaviour; Consumer Behaviour.; Business and Economics;

    Abstract : Title: Building Blocks for a Better Buyer Experience: Consumer Perceptions of Blockchain Authentication Methods in Second-Hand Luxury E-Commerce Date of the Seminar: 2nd of June, 2023 Course: BUSN39: Degree Project in Global Marketing Authors: Lisa Alm, Amanda Gerth & Katie Fajer Supervisor: Burak Tunca Keywords: Second-hand luxury e-commerce, Blockchain technology, Authentication, Perceived Risk, Theory of Planned Behaviour, Consumer Behaviour. Thesis Purpose: To explore consumer perspectives towards the implementation blockchain technology as a service offered within the authentication of second-hand vintage luxury e-commerce Methodology: This quantitative research study utilises an independent sample t-test to compare Perceived Risk, Attitudes, Perceived Behavioural Control, Subjective Norms, and Purchase Intention in regard to authentication method surveyed. READ MORE

  2. 27. The trends in the offline password-guessing field : Offline guessing attack on Swedish real-life passwords

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Yasser Zarzour; Mohamad Alchtiwi; [2023]
    Keywords : Password security; password-guessing tool; password-guessing method; password-guessing technique; offline attack; Swedish password leak; Lösenordssäkerhet; lösenordsgissningsverktyg; lösenordsgissningsmetoder; lösenordsgissningstekniker; offline attack; svenska lösenordsläckor;

    Abstract : Password security is one of the most critical aspects of IT security, as password-based authentication is still the primary authentication method. Unfortunately, our passwords are subject to different types of weaknesses and various types of password-guessing attacks. READ MORE

  3. 28. IoT and smart grid : Communication security

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : John Halldén; [2023]
    Keywords : ;

    Abstract : Electrical grids are a part of the critical infrastructure that society is reliant on for the running of everyday operations. The nature of the electrical grids results in them being located in different locations throughout the country to provide their services. READ MORE

  4. 29. SQL injection attacks and countermeasures in PHP, and Cross-Site Request Forgery

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Alexander Sabelström; [2023]
    Keywords : ;

    Abstract : Websites have become a vital tool for any establishment's success. However, all users do not enter websites with good intentions. Two commonly seen website functionalities are a login system and the possibility for users to leave and read reviews. READ MORE

  5. 30. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qi Li; [2023]
    Keywords : NETCONF; RESTCONF; x509 over SSH; Erlang; Network Automation; PKIX; Public Key Infrastructure X.509 ; NETCONF; RESTCONF; x509 over SSH; Erlang; Nätverksautomatiserng; PKIX; Public Key Infrastructure X.509 ;

    Abstract : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. READ MORE