Essays about: "login"
Showing result 1 - 5 of 56 essays containing the word login.
-
1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. READ MORE
-
2. User experience of the login flow in Duo : A study of user perception of trust, reliability and communicated soft values in user interface design of a login f low
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : User interface design should provide meaningful and relevant experiences to the user. Users have different expectations on quality factors in services of different domains of usage. READ MORE
-
3. Analyzing Survey Response Time and Response Rate for Colorectal Cancer Patients Using Logistic and Poisson Regression
University essay from KTH/Matematisk statistikAbstract : Cancer is a highly prevalent disease worldwide, claiming hundreds of lives each year. In the field of cancer research, it is customary to conduct surveys in which patients are asked to self-report and assess their symptoms and overall health. READ MORE
-
4. A case study of unauthorized login attempts against honeypots via remote desktop
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. READ MORE
-
5. Password Managers in Digital Forensics
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Digital forensics – the scientific process to draw evidence from digital devices confiscated in a criminal investigation – is constantly adapting to technological changes. A current challenge is the widespread use of encryption that makes classical data retrieval methods obsolete. READ MORE