Essays about: "user authentication"

Showing result 16 - 20 of 157 essays containing the words user authentication.

  1. 16. Password Management : A Study about Current Challenges with Password Management

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Ali Jalali; Laila Assadi; Asma Osman; [2023]
    Keywords : Password managers; password management; password security; user behavior; authentication methods;

    Abstract : Effective password management is crucial for safeguarding online accounts and sensitive information. This research examines the current challenges and provides alternative solutions for better password management. This study encompasses a comprehensive survey and interviews conducted with individuals across various professional backgrounds. READ MORE

  2. 17. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qi Li; [2023]
    Keywords : NETCONF; RESTCONF; x509 over SSH; Erlang; Network Automation; PKIX; Public Key Infrastructure X.509 ; NETCONF; RESTCONF; x509 over SSH; Erlang; Nätverksautomatiserng; PKIX; Public Key Infrastructure X.509 ;

    Abstract : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. READ MORE

  3. 18. Women's perceived security in shared autonomous vehicles : The impact of identifying co-passengers

    University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronik

    Author : Emma Sundin; [2022]
    Keywords : Shared Autonomous Vehicles; Ride-sharing; Women s Security; Trust; User Authentication; Mobility;

    Abstract : The present thesis aims to establish ideas and technical solutions that can have a positive impact on women's perceived safety while traveling in autonomous vehicles, made for sharing with strangers. The method follows the Design Thinking model which contributes to a user-centered design approach. READ MORE

  4. 19. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  5. 20. Multi-factor Authentication Mechanism Based on Browser Fingerprinting and Graphical HoneyTokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Dillon Jonsson; Amin Marteni; [2022]
    Keywords : Multi-factor Authentication; Browser Fingerprinting; Graphical Passwords; Honeytokens;

    Abstract : Multi-factor authentication (MFA) offers a wide range of methods and techniques available today. The security benefits of using MFA are almost indisputable, however, users are reluctant to adopt the technology. While many new MFA solutions are being proposed, there is a lack of consideration for user sentiment in the early stages of development. READ MORE