Essays about: "Two-Factor Authentication"
Showing result 6 - 10 of 15 essays containing the words Two-Factor Authentication.
-
6. Open Source Security Token for Linux
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : The project investigates and implements a two-factor authentication system utilizing the RSA cryptography scheme. The system consists of an FPGA security token and a PAM module for Linux. Two similar solutions were made, one air-gapped with a shorter key (version A), whereas the other communicated over USB (version B). READ MORE
-
7. A Theoretical Proposal of Two-Factor Authentication in Smartphones
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : Context. For a user to gain access to a protected resource on the web,the user needs to get authenticated. There are different forms of authenti-cation, among the most common is the ordinary user name and passwordscheme. READ MORE
-
8. Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Two-Factor Authentication (2FA) is a two-step verification process that aims to provide an additional layer of security by requiring the user to authenticate himself/herself using a secondary means (ownership factor or inheritance factor). Without the use of 2FA, an attacker could gain access to a person’s devices or accounts solely by knowing the victim’s password, while with 2FA knowing only this password is insufficient to pass the authentication check. READ MORE
-
9. A method to identify Record and Replay bots on mobile applications using Behaviometrics
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Many banking and commerce mobile applications use two-factor authentication for userauthentication purposes which include both password and behavioral based authenticationsystems. These behavioral based authentication systems use different behavioral parametersrelated to typing behavior of the user and the way user handles the phone while typing. READ MORE
-
10. Investigating Open Source Alternatives for an Electronic Identity System
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Electronic IDs enable people, companies and organizations to sign documents and authenticate online. Considering the potential losses, the security in an eID system is crucial. The eID system in Sweden today, BankID, is closed source and uses proprietary standards. READ MORE