Essays about: "Two-Factor Authentication"

Showing result 6 - 10 of 15 essays containing the words Two-Factor Authentication.

  1. 6. Open Source Security Token for Linux

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Gustav Elin Örtenberg Christoffer Roxbergh Adam Mathiesen Johan Fredriksson Ben Mohammad; [2017-08-10]
    Keywords : FPGA; Linux; Open source; OpenSSL; PAM; RSA; Security; Twofactor; ;

    Abstract : The project investigates and implements a two-factor authentication system utilizing the RSA cryptography scheme. The system consists of an FPGA security token and a PAM module for Linux. Two similar solutions were made, one air-gapped with a shorter key (version A), whereas the other communicated over USB (version B). READ MORE

  2. 7. A Theoretical Proposal of Two-Factor Authentication in Smartphones

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Oskar Persson; Erik Wermelin; [2017]
    Keywords : Two-factor authentication; smartphone; fingerprint authentication;

    Abstract : Context. For a user to gain access to a protected resource on the web,the user needs to get authenticated. There are different forms of authenti-cation, among the most common is the ordinary user name and passwordscheme. READ MORE

  3. 8. Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Niklas Tellini; Fredrik Vargas; [2017]
    Keywords : Two-Factor Authentication; Security; One-Time Passwords; Access control; Digital Assessment Platform; Två-stegs autentisering; Säkerhet; Engångslösenord; Åtkomst kontroll; Digital bedömningsplattform;

    Abstract : Two-Factor Authentication (2FA) is a two-step verification process that aims to provide an additional layer of security by requiring the user to authenticate himself/herself using a secondary means (ownership factor or inheritance factor). Without the use of 2FA, an attacker could gain access to a person’s devices or accounts solely by knowing the victim’s password, while with 2FA knowing only this password is insufficient to pass the authentication check. READ MORE

  4. 9. A method to identify Record and Replay bots on mobile applications using Behaviometrics

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Katyayani Kiranmayee Kolluru; [2017]
    Keywords : Behaviometrics; Machine learning; bot detection;

    Abstract : Many banking and commerce mobile applications use two-factor authentication for userauthentication purposes which include both password and behavioral based authenticationsystems. These behavioral based authentication systems use different behavioral parametersrelated to typing behavior of the user and the way user handles the phone while typing. READ MORE

  5. 10. Investigating Open Source Alternatives for an Electronic Identity System

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Martin Richter; Per Ahlbom; [2016]
    Keywords : Technology and Engineering;

    Abstract : Electronic IDs enable people, companies and organizations to sign documents and authenticate online. Considering the potential losses, the security in an eID system is crucial. The eID system in Sweden today, BankID, is closed source and uses proprietary standards. READ MORE