Essays about: "user authentication"

Showing result 21 - 25 of 157 essays containing the words user authentication.

  1. 21. Security and performance impact of client-side token storage methods

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Gustav Fors; Abbas Radhi; [2022]
    Keywords : storage; security; performance; tokens;

    Abstract : Applications store more data than ever before, including sensitive information such as user data, credit card information, and company secrets. Due to the value of this data, malicious actors have a financial incentive to employ a variety of attacks against applications in order to gain access to it. READ MORE

  2. 22. Vulnerability assessment of IoT-based Smart Lighting Systems

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Saram Zafar; [2022]
    Keywords : ;

    Abstract : This study addresses the significant gap in literature regarding the security risks of smart lighting systems integrated within the Internet of Things (IoT) in commercial-industrial buildings. Utilizing the OCTAVE Allegro methodol-ogy(Caralli, Stevens, Young, & Wilson, 2007), a thorough risk assessment was performed, focusing on four main information assets: sensor data, sensors and their controllers, the centralized control server data of the Smart Lighting Sys-tems (SLS), and device identifiers and authentication credentials. READ MORE

  3. 23. Developing a passwordgenerating software : Regarding password memorability and security

    University essay from KTH/Hälsoinformatik och logistik

    Author : Anton Mogaddam; Khan Muhammad; [2022]
    Keywords : Passwords; keyboard patterns; password memorability; Python; Hashcat; Lösenord; tangentbords mönster; minnesvärdhet för lösenord; Python; Hashcat;

    Abstract : With the growth of digital information and technology, more websites require user authentication to access individuals' sensitive information. The main form of authentication are passwords which if chosen unwisely can easily be guessed or cracked by someone else. This is why it is important to create safe yet memorable passwords. READ MORE

  4. 24. GNSS Safety and Handling

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Axel Björklund; [2022]
    Keywords : Navigation; GNSS; GPS; Galileo; OSNMA; TESLA protocol; SHA-256; jamming; spoofing; SDR; GPS-SDR-SIM; Smart Tachograph; dead reckoning; U-blox; Volvo Group; Volvo FH;

    Abstract : Satellite navigation (such as GPS) has become widely successful and is used by billions of users daily. Accuratepositioning and timing has a wide range of applications and is increasingly being integrated in safety criticalsystems such as autonomous operations, traffic management, navigation for airplanes and other vehicles. READ MORE

  5. 25. Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature Review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Asier Iriarte Murgiondo; [2022]
    Keywords : authentication; multi-factor authentication; Universal 2nd Factor; U2F; Timebased One-time Password; TOTP; usability; comparison; autenticación; autenticación de múltiples factores; Universal 2nd Factor; U2F; Time-based One-time Password; TOTP; usabilidad;

    Abstract : Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. READ MORE