Essays about: "Two-Factor Authentication"
Showing result 1 - 5 of 15 essays containing the words Two-Factor Authentication.
-
1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. READ MORE
-
2. Ethical hacking of a Smart Wi-Fi Plug
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This bachelor’s thesis paper investigates the security of a smart Wi-Fi plug a power outlet remotely controlled by a smart phone, the Deltaco Smart Home SH-P01. In order to raise the security standards of the numerous new digital products produced every year, the possible security flaws of these devices must be exposed and made official to the general public. READ MORE
-
3. Masquerader Detection via 2fa Honeytokens
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE
-
4. Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. READ MORE
-
5. Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey
University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystemAbstract : The use of a second factor to increase the security of systems is growing and has continued to do so for a long time. This thesis explores options for implementation to use a YubiKey as an authentication method (OTP) as well as for signing digital transactions through a web browser client. READ MORE