Essays about: "Password storage"

Showing result 1 - 5 of 9 essays containing the words Password storage.

  1. 1. Login hardening with Multi-factor Authentication

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Michaela Bergman; [2021]
    Keywords : multi-factor authentication; authentication; security; usability; cost; biometrics; biometric authentication; openid connect; oauth 2.0; PKCE; account recovery; security threats; authentication factors; Technology and Engineering;

    Abstract : The aim with this Master’s Thesis work was to conduct research about different available authenticators, as well as implementing a multi-factor authenticator into the currently used login-application. The research included biometric authentication technologies, and investigation of how to implement these to create a highly secure and customizable multi-factor authentication for My Axis-accounts for Axis Communications in Lund. READ MORE

  2. 2. Multi-factor Authentication : System proposal and analysis of continuous authentication methods

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Markus Fält; [2020]
    Keywords : continuous authentication; machine learning;

    Abstract :  It is common knowledge that the average user has multiple online accounts which all require a password. Some studies have shown that the number password for the average user is around 25. Considering this, one can see that it is unreasonable to expect the average user to have 25 truly unique passwords. READ MORE

  3. 3. Leveraging an Active Directory for the Generation of Honeywords

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johan Lundström; [2018]
    Keywords : honeywords; passwords; authentication; password-based authentication; password cracking; deception techniques;

    Abstract : Honeywords, fake passwords that when used by an adversary are set to trigger an alarm, is one way of detecting security breaches. For them to be effective, however, they must resemble real passwords as closely as possible and thus, the construction of the honeywords is crucial. READ MORE

  4. 4. Identification of cloud service use-cases and quality aspects:end-user perspective : Learnability, Operability and Security quality attributes and their corresponding use cases

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik; Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Pol Haghverdian; Martin Olsson; [2016]
    Keywords : cloud; service; ranking; use-case;

    Abstract : Context. With the entry of smart-phones on the market in the beginningof 2007, the integration of an mp3 player, camera and gps into an all in onedevice. As the integration was realized, creating and storing own contentbecame easier. Therefore the need of more storage became a problem as thesmart-phones were limited in capacity. READ MORE

  5. 5. KeySafe The platform-independent password safe with external security

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Olof Björklund; [2015]
    Keywords : Password management; security;

    Abstract : Storing and accessing sensitive data has become an important task in today’s society. Many different services require login credentials for users to remember in order to authenticate themselves. A common habit is to use the same password for several services. READ MORE