Sökning: "Two-Factor Authentication"

Visar resultat 11 - 15 av 23 uppsatser innehållade orden Two-Factor Authentication.

  1. 11. Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey

    Kandidat-uppsats, Linköpings universitet/Artificiell intelligens och integrerade datorsystem

    Författare :David Hilm; David Rahim; [2019]
    Nyckelord :Digital signature; Security; Two-factor Authentication; Authentication; Cryptography; YubiKey; JavaScript; WebCrypto; Universal Second Factor;

    Sammanfattning : The use of a second factor to increase the security of systems is growing and has continued to do so for a long time. This thesis explores options for implementation to use a YubiKey as an authentication method (OTP) as well as for signing digital transactions through a web browser client. LÄS MER

  2. 12. Open Source Security Token for Linux

    Kandidat-uppsats, Göteborgs universitet/Institutionen för data- och informationsteknik

    Författare :Gustav Elin Örtenberg Christoffer Roxbergh Adam Mathiesen Johan Fredriksson Ben Mohammad; [2017-08-10]
    Nyckelord :FPGA; Linux; Open source; OpenSSL; PAM; RSA; Security; Twofactor; ;

    Sammanfattning : The project investigates and implements a two-factor authentication system utilizing the RSA cryptography scheme. The system consists of an FPGA security token and a PAM module for Linux. Two similar solutions were made, one air-gapped with a shorter key (version A), whereas the other communicated over USB (version B). LÄS MER

  3. 13. A Theoretical Proposal of Two-Factor Authentication in Smartphones

    Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Författare :Oskar Persson; Erik Wermelin; [2017]
    Nyckelord :Two-factor authentication; smartphone; fingerprint authentication;

    Sammanfattning : Context. For a user to gain access to a protected resource on the web,the user needs to get authenticated. There are different forms of authenti-cation, among the most common is the ordinary user name and passwordscheme. LÄS MER

  4. 14. Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform

    Kandidat-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Författare :Niklas Tellini; Fredrik Vargas; [2017]
    Nyckelord :Two-Factor Authentication; Security; One-Time Passwords; Access control; Digital Assessment Platform; Två-stegs autentisering; Säkerhet; Engångslösenord; Åtkomst kontroll; Digital bedömningsplattform;

    Sammanfattning : Two-Factor Authentication (2FA) is a two-step verification process that aims to provide an additional layer of security by requiring the user to authenticate himself/herself using a secondary means (ownership factor or inheritance factor). Without the use of 2FA, an attacker could gain access to a person’s devices or accounts solely by knowing the victim’s password, while with 2FA knowing only this password is insufficient to pass the authentication check. LÄS MER

  5. 15. A method to identify Record and Replay bots on mobile applications using Behaviometrics

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Katyayani Kiranmayee Kolluru; [2017]
    Nyckelord :Behaviometrics; Machine learning; bot detection;

    Sammanfattning : Many banking and commerce mobile applications use two-factor authentication for userauthentication purposes which include both password and behavioral based authenticationsystems. These behavioral based authentication systems use different behavioral parametersrelated to typing behavior of the user and the way user handles the phone while typing. LÄS MER