Essays about: "Proof of Authentication"
Showing result 1 - 5 of 28 essays containing the words Proof of Authentication.
-
1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. READ MORE
-
2. An Integrated Room Booking and Access Control System for Public Spaces
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. READ MORE
-
3. Profile Based Access Control Model Using JSON Web Tokens
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE
-
4. Fuzzing of PKCS#11 Trusted Application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE
-
5. Comparison between consensus algorithms in an IIoT network : Analysis of Proof of Work, Proof of Stake and Proof of Authentication
University essay from KTH/Hälsoinformatik och logistikAbstract : The Industrial Internet of Things (IIoT) is growing day by day and is implemented in many industries. The centralized architecture of an IIoT system is composed of several devices that communicate with a special device only via one link, in an instance where this one link is attacked, major problems could occur for the whole system. READ MORE