Essays about: "Passwords"
Showing result 21 - 25 of 76 essays containing the word Passwords.
-
21. Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature Review
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. READ MORE
-
22. Security or Usability : A literature study about strategies for how users choose passwords
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Security solutions such as passwords are widely used around the world. Choosing a new password is an important security choice with significant concern for end users. For the emphasis on the security-focused feature of a password, passwords can be complicated and long. READ MORE
-
23. Password Security Assessment of IoT-Devices
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid development of the IoT (Internet of Things) and the integration of connected devices into our households, IoT security is becoming more important. This technology allows the user to accomplish tasks and store information in a more effective way. READ MORE
-
24. Password protection by analyzed keystrokes : Using Artificial Intelligence to find the impostor
University essay fromAbstract : A literature review was done to find that there are still issues with writing passwords. From the information gathered, it is stated that using keystroke characteristics could have the potential to add another layer of security to compromised user accounts. READ MORE
-
25. Blockchain Applicability in IoT Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The Internet of things (IoT) combines sensors and connectivity and can be applied to a wide variety of things. The security in these IoT devices is usually constrained by their limited hardware. When IoT handles sensitive data, security becomes an important challenge. READ MORE