Essays about: "User Authentication"

Showing result 1 - 5 of 132 essays containing the words User Authentication.

  1. 1. Women's perceived security in shared autonomous vehicles : The impact of identifying co-passengers

    University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronik

    Author : Emma Sundin; [2022]
    Keywords : Shared Autonomous Vehicles; Ride-sharing; Women s Security; Trust; User Authentication; Mobility;

    Abstract : The present thesis aims to establish ideas and technical solutions that can have a positive impact on women's perceived safety while traveling in autonomous vehicles, made for sharing with strangers. The method follows the Design Thinking model which contributes to a user-centered design approach. READ MORE

  2. 2. Multi-factor Authentication Mechanism Based on Browser Fingerprinting and Graphical HoneyTokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Dillon Jonsson; Amin Marteni; [2022]
    Keywords : Multi-factor Authentication; Browser Fingerprinting; Graphical Passwords; Honeytokens;

    Abstract : Multi-factor authentication (MFA) offers a wide range of methods and techniques available today. The security benefits of using MFA are almost indisputable, however, users are reluctant to adopt the technology. While many new MFA solutions are being proposed, there is a lack of consideration for user sentiment in the early stages of development. READ MORE

  3. 3. Developing a passwordgenerating software : Regarding password memorability and security

    University essay from KTH/Hälsoinformatik och logistik

    Author : Anton Mogaddam; Khan Muhammad; [2022]
    Keywords : Passwords; keyboard patterns; password memorability; Python; Hashcat; Lösenord; tangentbords mönster; minnesvärdhet för lösenord; Python; Hashcat;

    Abstract : With the growth of digital information and technology, more websites require user authentication to access individuals' sensitive information. The main form of authentication are passwords which if chosen unwisely can easily be guessed or cracked by someone else. This is why it is important to create safe yet memorable passwords. READ MORE

  4. 4. GNSS Safety and Handling

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Axel Björklund; [2022]
    Keywords : Navigation; GNSS; GPS; Galileo; OSNMA; TESLA protocol; SHA-256; jamming; spoofing; SDR; GPS-SDR-SIM; Smart Tachograph; dead reckoning; U-blox; Volvo Group; Volvo FH;

    Abstract : Satellite navigation (such as GPS) has become widely successful and is used by billions of users daily. Accuratepositioning and timing has a wide range of applications and is increasingly being integrated in safety criticalsystems such as autonomous operations, traffic management, navigation for airplanes and other vehicles. READ MORE

  5. 5. Masquerader Detection via 2fa Honeytokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Anton Wiklund; [2021]
    Keywords : Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE