Sökning: "distributed authentication"

Visar resultat 1 - 5 av 35 uppsatser innehållade orden distributed authentication.

  1. 1. Profile Based Access Control Model Using JSON Web Tokens

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Mustafa Albayati; Aslan Murjan; [2023]
    Nyckelord :access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Sammanfattning : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. LÄS MER

  2. 2. Privacy Preserving Biometric Multi-factor Authentication

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Emil Gedenryd; [2023]
    Nyckelord :Fully Homomorphic Encryption; Machine Learning; Biometric Authentication; Technology and Engineering;

    Sammanfattning : This thesis investigates the viability of using Fully Homomorphic Encryption and Machine Learning to construct a privacy-preserving biometric multi-factor authentication system. The system is based on the architecture described as ”Model K - Store distributed, compare distributed” in ISO/IEC 24745:2022 and uses the Torus Fully Homomorphic Encryption scheme proposed by Chillotti et al. LÄS MER

  3. 3. Building Blocks for a Better Buyer Experience: Consumer Perceptions of Blockchain Authentication Methods in Second-Hand Luxury E-Commerce

    Magister-uppsats, Lunds universitet/Företagsekonomiska institutionen

    Författare :Katie Fajer; Lisa Alm; Amanda Gerth; [2023]
    Nyckelord :Second-hand luxury e-commerce; Blockchain technology; Authentication; Perceived Risk; Theory of Planned Behaviour; Consumer Behaviour.; Business and Economics;

    Sammanfattning : Title: Building Blocks for a Better Buyer Experience: Consumer Perceptions of Blockchain Authentication Methods in Second-Hand Luxury E-Commerce Date of the Seminar: 2nd of June, 2023 Course: BUSN39: Degree Project in Global Marketing Authors: Lisa Alm, Amanda Gerth & Katie Fajer Supervisor: Burak Tunca Keywords: Second-hand luxury e-commerce, Blockchain technology, Authentication, Perceived Risk, Theory of Planned Behaviour, Consumer Behaviour. Thesis Purpose: To explore consumer perspectives towards the implementation blockchain technology as a service offered within the authentication of second-hand vintage luxury e-commerce Methodology: This quantitative research study utilises an independent sample t-test to compare Perceived Risk, Attitudes, Perceived Behavioural Control, Subjective Norms, and Purchase Intention in regard to authentication method surveyed. LÄS MER

  4. 4. Distributed Relay/Replay Attacks on GNSS Signals

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Malte Lenhart; [2022]
    Nyckelord :Global Navigation Satellite System GNSS ; Spoofing; Relay Replay Attack; Software Defined Radio SDR ; Security; Satellitnavigeringssystem; Spoofing; Relay Replay Attack; Software Defined Radio SDR ; Säkerhet;

    Sammanfattning : In modern society, Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon by many systems, among others in critical infrastructure, for navigation and time synchronization. To overcome the prevailing vulnerable state of civilian GNSSs, many detection schemes for different attack types (i.e. LÄS MER

  5. 5. Evaluating the Single Sign-On Protocol OpenID Connect for an Electronic Document Signature Service From a Security Perspective

    Master-uppsats, Linköpings universitet/Programvara och system

    Författare :Ludvig Thor; [2022]
    Nyckelord :OIDC; Single sign-on; Security;

    Sammanfattning : Today, there is an increasing demand for authentication services to provide authentication to users on the internet. One example of an authentication protocol is OpenID Connect. It is used by for example Google to provide single sign-on functionality to millions of users. LÄS MER