Sökning: "Proof of authentication"
Visar resultat 1 - 5 av 32 uppsatser innehållade orden Proof of authentication.
1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password
Master-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. LÄS MER
2. An Integrated Room Booking and Access Control System for Public Spaces
Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. LÄS MER
3. Profile Based Access Control Model Using JSON Web Tokens
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. LÄS MER
4. Säker nyckelhantering i webbläsaren
Kandidat-uppsats, Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Sammanfattning : Idag används vanligtvis lösenord som autentiseringsmetod i moderna applikationer. Men allt fler företag och applikationer övergår från denna metod och i stället använda krypterade nycklar och certifikat för att öka säkerheten. LÄS MER
5. Fuzzing of PKCS#11 Trusted Application
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. LÄS MER