Sökning: "Proof of authentication"

Visar resultat 1 - 5 av 32 uppsatser innehållade orden Proof of authentication.

  1. 1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password

    Master-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Fawad Ahmad; [2024]
    Nyckelord :;

    Sammanfattning : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. LÄS MER

  2. 2. An Integrated Room Booking and Access Control System for Public Spaces

    Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Jaffar Kamil; Mohamed Amer; [2023]
    Nyckelord :Integrated Systems; Room Booking System; Access Control System; Bank ID; Mobile Applications;

    Sammanfattning : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. LÄS MER

  3. 3. Profile Based Access Control Model Using JSON Web Tokens

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Mustafa Albayati; Aslan Murjan; [2023]
    Nyckelord :access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Sammanfattning : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. LÄS MER

  4. 4. Säker nyckelhantering i webbläsaren

    Kandidat-uppsats, Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Författare :Daniel Engman; William Hagman; [2023]
    Nyckelord :WebAuthn; AWS; FIDO; FIDO2; prf; large blob; Knigtech; WebAuthn; AWS; FIDO; FIDO2; prf; large blob; Knigtech;

    Sammanfattning : Idag används vanligtvis lösenord som autentiseringsmetod i moderna applikationer. Men allt fler företag och applikationer övergår från denna metod och i stället använda krypterade nycklar och certifikat för att öka säkerheten. LÄS MER

  5. 5. Fuzzing of PKCS#11 Trusted Application

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Kevin Zeng; [2022]
    Nyckelord :Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Sammanfattning : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. LÄS MER