Essays about: "user authentication"
Showing result 21 - 25 of 157 essays containing the words user authentication.
-
21. Security and performance impact of client-side token storage methods
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Applications store more data than ever before, including sensitive information such as user data, credit card information, and company secrets. Due to the value of this data, malicious actors have a financial incentive to employ a variety of attacks against applications in order to gain access to it. READ MORE
-
22. Vulnerability assessment of IoT-based Smart Lighting Systems
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : This study addresses the significant gap in literature regarding the security risks of smart lighting systems integrated within the Internet of Things (IoT) in commercial-industrial buildings. Utilizing the OCTAVE Allegro methodol-ogy(Caralli, Stevens, Young, & Wilson, 2007), a thorough risk assessment was performed, focusing on four main information assets: sensor data, sensors and their controllers, the centralized control server data of the Smart Lighting Sys-tems (SLS), and device identifiers and authentication credentials. READ MORE
-
23. Developing a passwordgenerating software : Regarding password memorability and security
University essay from KTH/Hälsoinformatik och logistikAbstract : With the growth of digital information and technology, more websites require user authentication to access individuals' sensitive information. The main form of authentication are passwords which if chosen unwisely can easily be guessed or cracked by someone else. This is why it is important to create safe yet memorable passwords. READ MORE
-
24. GNSS Safety and Handling
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Satellite navigation (such as GPS) has become widely successful and is used by billions of users daily. Accuratepositioning and timing has a wide range of applications and is increasingly being integrated in safety criticalsystems such as autonomous operations, traffic management, navigation for airplanes and other vehicles. READ MORE
-
25. Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature Review
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. READ MORE