Essays about: "Two-factor Authentication"

Showing result 11 - 15 of 15 essays containing the words Two-factor Authentication.

  1. 11. Two-factor Authentication in Smartphones: Implementations and Attacks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Christofer Ericson; [2015]
    Keywords : Technology and Engineering;

    Abstract : Two-factor authentication is the method of combining two so called authentication factors in order to enhance the security of user authentication. An authentication factor is defined as ”Something the user knows, has or is”. READ MORE

  2. 12. The major security challenges to cloud computing.

    University essay from Högskolan i Borås/Institutionen Handels- och IT-högskolan

    Author : Muhammad Inam ul Haq; [2013]
    Keywords : Information security; packet filtering; cloud interface; digital signatures; firewalls; ICMP ping attack; data integrity;

    Abstract : Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through a web browser or light-weight desktop machine over the internet (Wink, 2012). This computing model abolishes the necessity of sustaining the computer resources locally hence cuts-off the cost of valuable resources (Moreno, Montero & Llorente, 2012). READ MORE

  3. 13. Two Way Mobile Authentication System

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Karthik Mandava; Harish Dinne; [2010]
    Keywords : Two factor authentication; One Time Password OTP ; Demo online Banking application; computer security; mobile device for authentication;

    Abstract : The ever increasing use of internet around the world has without doubt increased the usage of internet based services, e-business models, easier ways of communication and information sharing. Such drastic increase in usage of network based systems has made the current cyber security systems old dated as the hackers and attackers of networked systems is on the rise with new and modern attack methodologies. READ MORE

  4. 14. Online banking access system : Principles behind choices and further development, seen from a managerial perspective

    University essay from IHH, Informatik

    Author : Sofia Li; Patrik Ekberg; Gentiana Morina; [2007]
    Keywords : online banking; internet banking; ebanking; online banking access system;

    Abstract : Online banking is a young way for banks to reach new and old customers. The concept has emerged over the last decade from being not very utilized to become a major channel for the bigger banks in Sweden but also in the world. READ MORE

  5. 15. Strong user authentication mechanisms

    University essay from Institutionen för systemteknik

    Author : Emil Haraldsson; [2005]
    Keywords : Informationsteknik; kryptografi; verifiering; nätverk; matematik; säkerhet; informationsteknologi; datasäkerhet; cryptography; authentication; mathematics; security; informationtechnology; computersecurity; it-security; Informationsteknik;

    Abstract : For Siemens Industrial Turbomachinery to meet its business objectives a modular authentication concept has to be implemented. Such a mechanism must be cost- effective while providing a well-balanced level of security, easy maintenance and be as user-friendly as possible. READ MORE