Essays about: "user authentication"

Showing result 1 - 5 of 110 essays containing the words user authentication.

  1. 1. Multi-factor Authentication : System proposal and analysis of continuous authentication methods

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Markus Fält; [2020]
    Keywords : continuous authentication; machine learning;

    Abstract :  It is common knowledge that the average user has multiple online accounts which all require a password. Some studies have shown that the number password for the average user is around 25. Considering this, one can see that it is unreasonable to expect the average user to have 25 truly unique passwords. READ MORE

  2. 2. Building a suitable testing-platform to measure impact of typographic effects on web pages

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Joakim Sjöquist; [2020]
    Keywords : Typography; text-background color; typographic effects; test platform; user interface; user experience;

    Abstract : The purpose of this study was to create a testing-platform that mea- sures the impact of typographic effects on web pages. This study chose to focus on highlighted text (text with high contrast background- color) as a typographic tool. READ MORE

  3. 3. Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jakub Porubsky; [2020]
    Keywords : mobile payments; m-payments; biometrics; fingerprint; face recognition; 2FA;

    Abstract : Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. READ MORE

  4. 4. Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Nico Ferrari; [2019]
    Keywords : Internet of Things; Context-based authentication; Fuzzy commitment scheme; Cryptographic key establishment; Lightweight cryptography; Contiki; One-way accumulators;

    Abstract : The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. READ MORE

  5. 5. Authentication Using Deep Learning on User Generated Mouse Movement Images

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Olof Enström; [2019]
    Keywords : Machine Learning; Authentication; Behavioral Biometrics; Deep Learning; Convolutional Neural Networks;

    Abstract : Continuous authentication using behavioral biometrics can provide an additional layer of protection against online account hijacking and fraud. Mouse dynamics classification is the concept of determining the authenticity of a user through the use of machine learning algorithms on mouse movement data. READ MORE