Essays about: "Oauth"

Showing result 1 - 5 of 14 essays containing the word Oauth.

  1. 1. Login hardening with Multi-factor Authentication

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Michaela Bergman; [2021]
    Keywords : multi-factor authentication; authentication; security; usability; cost; biometrics; biometric authentication; openid connect; oauth 2.0; PKCE; account recovery; security threats; authentication factors; Technology and Engineering;

    Abstract : The aim with this Master’s Thesis work was to conduct research about different available authenticators, as well as implementing a multi-factor authenticator into the currently used login-application. The research included biometric authentication technologies, and investigation of how to implement these to create a highly secure and customizable multi-factor authentication for My Axis-accounts for Axis Communications in Lund. READ MORE

  2. 2. Characterizing the Third-Party Authentication Landscape : A Longitudinal Study of how Identity Providers are Used in Modern Websites

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Fredrik Josefsson Ågren; Oscar Järpehult; [2021]
    Keywords : Third Party Authentication; Authentication; Third-party Single Sign On; OpenID; OpenID connect; Oauth; TLS; Web Security; Identity Provider; Relying Party; IDP; RP; Longitudinal Analysis; Web Crawler; Selenium; Google; Facebook; Twitter; Apple;

    Abstract : Third-party authentication services are becoming more common since it eases the login procedure by not forcing users to create a new login for every website thatuses authentication. Even though it simplifies the login procedure the users still have to be conscious about what data is being shared between the identity provider (IDP) and the relying party (RP). READ MORE

  3. 3. Building Datagram Transport Layer Security (DTLS)-based access control in the Internet-of-Things

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chenxi Feng; [2020]
    Keywords : ;

    Abstract : With the widespread use of the Internet of Things (IoT), the security problem has raised social attention. Due to the limited calculation ability of the constrained device, it is difficult to download the defense software inside and the device just can use the built-in encryption mechanisms to defend attack. READ MORE

  4. 4. Exploring and Expanding the Functionalities of the MobileCoach Platform

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jonas Fockstedt; Ema Krcic; [2020]
    Keywords : MobileCoach; React Native; Android; OAuth 2.0; mobile development; docker; Google Fit; mobile healthcare;

    Abstract : Non-communicable diseases are the greatest burden on global healthcare, and because of today's limited health personnel, scalable behavioral health interventions are in need. MobileCoach is a behavioral intervention platform designed for aiding behavioral change amongst individuals. READ MORE

  5. 5. Proof-of-Possession Tokens in Microservice Architectures

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Ruaridh Watt; [2018]
    Keywords : ;

    Abstract : The popular OAuth 2.0 Framework specifies the use of Bearer Tokens for the transmission of authorization credentials. A Bearer Token has the property that any party in possession of it can use the it. Requests including Bearer Tokens are therefore performed over a secure channel t oensure that tokens cannot be obtained by eavesdroppers. READ MORE