Sökning: "Authentication Techniques"

Visar resultat 1 - 5 av 43 uppsatser innehållade orden Authentication Techniques.

  1. 1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password

    Master-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Fawad Ahmad; [2024]
    Nyckelord :;

    Sammanfattning : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. LÄS MER

  2. 2. Stöldskydd i Jordbruket

    Kandidat-uppsats, Linköpings universitet/Institutionen för systemteknik

    Författare :Fabian Coops; Grins Adam; [2023]
    Nyckelord :Elektroteknik; Stöld; LoRaWAN;

    Sammanfattning : This report examines and presents an effective way to alert the owner of a GPS device in case of theft in the agricultural sector. By implementing IR sensors that can be mounted under the object and monitor movements, the owner can receive a warning via SMS and email in case of a potential theft. LÄS MER

  3. 3. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Gatien Ducornaud; [2023]
    Nyckelord :Role Based Access Control RBAC ; Cybersecurity; Smart Grid; Substation; Desktop Applications; Contrôle d’accès basé sur les rôles RBAC ; Cybersécurité; Réseau électrique intelligent; Sous-Station; Application Desktop; Rollbaserad åtkomstkontroll RBAC ; Cybersäkerhet; Smarta nät; Transformatorstation; datorapplikation;

    Sammanfattning : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. LÄS MER

  4. 4. Acceptance of Biometric Systemsfor User Authentication and Identification

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Mymoon Dobaibi; [2023]
    Nyckelord :Biometrics Acceptance; Authentication Techniques; User Preferences; Preferred Techniques; User Experiences; User Perception.;

    Sammanfattning : Biometric systems have become increasingly popular for user authentication andidentification across various domains, including smartphones, laptops, financial services,healthcare, and security. These systems offer enhanced security and quickaccess to data, aiming to address the challenges associated with passwords and pins. LÄS MER

  5. 5. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak

    Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Lukas Einler Larsson; Kushtrim Qollakaj; [2023]
    Nyckelord :Cybersecurity; Remote work; VPN; Exploit; Hardening;

    Sammanfattning : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. LÄS MER