Essays about: "authentication"

Showing result 11 - 15 of 393 essays containing the word authentication.

  1. 11. Privacy-preserving Authentication in Participatory Sensing Systems : An attribute based authentication solution with sensor requirement enforcement.

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jose Luis Martin Navarro; [2023]
    Keywords : Anonymous authentication; privacy; ABS; participatory-sensing-systems; applied-cryptography; mobile-crowdsensing; Anonym autentisering; integritet; ABS; deltagande-avkänningssystem; tillämpad kryptografi; mobil-crowdsensing;

    Abstract : Participatory Sensing Systems (PSS) are a type of Mobile Crowdsensing System where users voluntarily participate in contributing information. Task initiators create tasks, targeting specific data that needs to be gathered by the users’ device sensors. READ MORE

  2. 12. The effect of human memory on password behavior : An investigation

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Márton Tarczal; [2023]
    Keywords : Cybersecurity awareness; cognitive ability; password behavior; memory; cued recall; demographics; questionnaire;

    Abstract : Passwords are widely used as a primary method of authentication and access control, making them a critical component in safeguarding digital assets. However, individuals’ password-related behaviors, such as password selection, memorization, and management, significantly impact the security of their accounts. READ MORE

  3. 13. Authentication challenges for people with neurodevelopmental disorders

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Patryk Chrzan; [2023]
    Keywords : Authentication; passwords; neurodevelopmental disorders; cybersecurity; disabilities; Autentisering; lösenord; neuropsykiatriska funktionsnedsättningar; datasäkerhet; funktionshinder;

    Abstract : We live in a world where we increasingly depend on information technology, as much of our work and education occurs online, often from home. An average user has an increasing amount of accounts for all kinds of online services, making authentication more and more important. READ MORE

  4. 14. Insider Threat For Service Account in Google Cloud Platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Ravikiran Talekar; [2023]
    Keywords : ;

    Abstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE

  5. 15. Formally Verified Remote Attestation Protocols with Strong Authentication

    University essay from Linköpings universitet/Programvara och system; Linköpings universitet/Tekniska fakulteten

    Author : Johannes Wilson; [2023]
    Keywords : ;

    Abstract : Most commodity processors available today provide hardware-supported security extensions. Remote attestation has been declared an important step towards providing security to users through such solutions, yet remote attestation has seen limited deployment in practice. READ MORE