Sökning: "Two-Factor Authentication"
Visar resultat 11 - 15 av 23 uppsatser innehållade orden Two-Factor Authentication.
11. Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey
Kandidat-uppsats, Linköpings universitet/Artificiell intelligens och integrerade datorsystemSammanfattning : The use of a second factor to increase the security of systems is growing and has continued to do so for a long time. This thesis explores options for implementation to use a YubiKey as an authentication method (OTP) as well as for signing digital transactions through a web browser client. LÄS MER
12. Open Source Security Token for Linux
Kandidat-uppsats, Göteborgs universitet/Institutionen för data- och informationsteknikSammanfattning : The project investigates and implements a two-factor authentication system utilizing the RSA cryptography scheme. The system consists of an FPGA security token and a PAM module for Linux. Two similar solutions were made, one air-gapped with a shorter key (version A), whereas the other communicated over USB (version B). LÄS MER
13. A Theoretical Proposal of Two-Factor Authentication in Smartphones
Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikSammanfattning : Context. For a user to gain access to a protected resource on the web,the user needs to get authenticated. There are different forms of authenti-cation, among the most common is the ordinary user name and passwordscheme. LÄS MER
14. Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform
Kandidat-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)Sammanfattning : Two-Factor Authentication (2FA) is a two-step verification process that aims to provide an additional layer of security by requiring the user to authenticate himself/herself using a secondary means (ownership factor or inheritance factor). Without the use of 2FA, an attacker could gain access to a person’s devices or accounts solely by knowing the victim’s password, while with 2FA knowing only this password is insufficient to pass the authentication check. LÄS MER
15. A method to identify Record and Replay bots on mobile applications using Behaviometrics
Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknikSammanfattning : Many banking and commerce mobile applications use two-factor authentication for userauthentication purposes which include both password and behavioral based authenticationsystems. These behavioral based authentication systems use different behavioral parametersrelated to typing behavior of the user and the way user handles the phone while typing. LÄS MER