Sökning: "mutual authentication"

Visar resultat 1 - 5 av 10 uppsatser innehållade orden mutual authentication.

  1. 1. Evaluating intrusion detection points in an end-to-end solution

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Lilla Pankaczi; [2023]
    Nyckelord :RFID; Random UID; Mutual Authentication; Scyther;

    Sammanfattning : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. LÄS MER

  2. 2. Secure and Privacy-Preserving Decentralized Wi-Fi Aware Service Discovery Architecture

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Jiahao Wang; [2022]
    Nyckelord :Wi-Fi Aware; Secure Service Discovery; Bloom Filter; TESLA; Client Puzzle; Wi-Fi Aware; Säker Serviceupptäckt; Bloom Filter; TESLA; Klient Pussel;

    Sammanfattning : In modern Mobile Ad hoc Networks (MANETs), service discovery is a major component for mobile devices to exchange data and find available services. However, service discovery architectures developed and adopted by the industry either are not appropriate for MANETs or cannot provide security and privacy protection to clients. LÄS MER

  3. 3. Security Evaluation of Damper System’s Communication and Update Process : Threat modeling using vehicleLang and securiCAD

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Joar Ekelund; [2021]
    Nyckelord :Electronic Control Unit; Update; Automotive; Threat Modeling; vehicleLang; securiCAD; Styrenhet; Uppdatera; fordonsteknik; Hotmodellering; vehicleLang; securi- CAD;

    Sammanfattning : As the automotive industry becomes increasingly reliant on digital systems it is of utmost importance that these systems are secure. Secure systems are of interest both for the general public as well as manufactures. LÄS MER

  4. 4. Security Test of iZettle's Reader 2 : A card terminal for safe payments?

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Daria Galal; Martin Tillberg; [2020]
    Nyckelord :izettle reader; ethical hacking; threat modelling; penetration testing; bluetooth; https.; izettle reader; etisk hackning; hotmodellering; penetrationstestning; bluetooth; https.;

    Sammanfattning : Ethical hacking and penetration testing are two methods often used when organizations and companies want to measure their level of information security, and find out if there are additional steps that can be taken in order to increase the security. This report describes a security test of the card terminal iZettle Reader 2, with the intention to examine its level of security based on the device’s frequent appearance in the society. LÄS MER

  5. 5. Exploring the Number of Tries Related to Cracking Passwords Generated with Different Strategies

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Marcus Birath; [2019]
    Nyckelord :Password; Cracking; Strategies;

    Sammanfattning : As more services and workflows are moved into computerized systems the number of accounts a person has to be aware of is on steady increase. Today the average user is likely to have more than 25 accounts for different services used on a daily basis that all need authentication. LÄS MER