Essays about: "User Authentication"
Showing result 16 - 20 of 157 essays containing the words User Authentication.
-
16. Password Management : A Study about Current Challenges with Password Management
University essay from Högskolan Dalarna/Institutionen för information och teknikAbstract : Effective password management is crucial for safeguarding online accounts and sensitive information. This research examines the current challenges and provides alternative solutions for better password management. This study encompasses a comprehensive survey and interviews conducted with individuals across various professional backgrounds. READ MORE
-
17. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. READ MORE
-
18. Women's perceived security in shared autonomous vehicles : The impact of identifying co-passengers
University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronikAbstract : The present thesis aims to establish ideas and technical solutions that can have a positive impact on women's perceived safety while traveling in autonomous vehicles, made for sharing with strangers. The method follows the Design Thinking model which contributes to a user-centered design approach. READ MORE
-
19. Fuzzing of PKCS#11 Trusted Application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE
-
20. Multi-factor Authentication Mechanism Based on Browser Fingerprinting and Graphical HoneyTokens
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Multi-factor authentication (MFA) offers a wide range of methods and techniques available today. The security benefits of using MFA are almost indisputable, however, users are reluctant to adopt the technology. While many new MFA solutions are being proposed, there is a lack of consideration for user sentiment in the early stages of development. READ MORE