Essays about: "mobile device for authentication"

Showing result 1 - 5 of 21 essays containing the words mobile device for authentication.

  1. 1. Privacy-preserving Authentication in Participatory Sensing Systems : An attribute based authentication solution with sensor requirement enforcement.

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jose Luis Martin Navarro; [2023]
    Keywords : Anonymous authentication; privacy; ABS; participatory-sensing-systems; applied-cryptography; mobile-crowdsensing; Anonym autentisering; integritet; ABS; deltagande-avkänningssystem; tillämpad kryptografi; mobil-crowdsensing;

    Abstract : Participatory Sensing Systems (PSS) are a type of Mobile Crowdsensing System where users voluntarily participate in contributing information. Task initiators create tasks, targeting specific data that needs to be gathered by the users’ device sensors. READ MORE

  2. 2. Ethical hacking of a Smart Wi-Fi Plug

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Markus Newton Hedelin; Marcus Samuelsson; [2022]
    Keywords : Bachelor’s thesis; Ethical hacking; Penetration testing; Internet of things; Smart plug; Mobile application; Cloud service; Kandidatexamensarbete; Etisk hackning; Penetrationstestning; Sakernas internet; Smart uttag; Mobilapplikation; Molntjänst;

    Abstract : This bachelor’s thesis paper investigates the security of a smart Wi-Fi plug a power outlet remotely controlled by a smart phone, the Deltaco Smart Home SH-P01. In order to raise the security standards of the numerous new digital products produced every year, the possible security flaws of these devices must be exposed and made official to the general public. READ MORE

  3. 3. Privacy risks caused by the Swedish Police use of IMSI-catchers in a democratic society

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Karl Martin Stawe; [2021]
    Keywords : ;

    Abstract : For over a decade, the Swedish government has debated the Swedish Police Authority, starting now, the Swedish Police, usage of IMSI-catchers, without finding a solution that provides a formal statute that balances crime-fighting and caring for a natural person's integrity. By IMSI-catchers, the author of this paper refers to the man-in-the-middle attack device that, among other things, can listen to SMS and phone calls in plaintext. READ MORE

  4. 4. Evaluating APS Ecosystem Security : Novel IoT Enabled Medical Platform for Diabetes Patients

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Batuhan Ceylan; [2020]
    Keywords : security; medical device; penetration testing; web application; IoT; säkerhet; medicinsk IoT; penetrationstest; webbapplikation;

    Abstract : Computing technology has been getting more reliable and cheaper every year for the past several decades. Consequently, IoT devices have now become a part of medical technology. One example of this is a new open-source technology that has emerged for type-1 diabetes patients, which regulates the patients’ blood glucose levels. READ MORE

  5. 5. Security Test of iZettle's Reader 2 : A card terminal for safe payments?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Daria Galal; Martin Tillberg; [2020]
    Keywords : izettle reader; ethical hacking; threat modelling; penetration testing; bluetooth; https.; izettle reader; etisk hackning; hotmodellering; penetrationstestning; bluetooth; https.;

    Abstract : Ethical hacking and penetration testing are two methods often used when organizations and companies want to measure their level of information security, and find out if there are additional steps that can be taken in order to increase the security. This report describes a security test of the card terminal iZettle Reader 2, with the intention to examine its level of security based on the device’s frequent appearance in the society. READ MORE