Sökning: "password-based authentication"
Visar resultat 1 - 5 av 12 uppsatser innehållade orden password-based authentication.
1. User authentication through behavioral biometrics using multi-class classification algorithms : A comprehensive study of machine learning algorithms for keystroke and mouse dynamics
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : User authentication is vital in a secure system. Authentication is achieved through something a genuine user knows, has, or is. The latter is called biometrics, commonly attributed with fingerprint and face modalities. It is also possible to identify a user based on their behavior, called behavioral biometrics. LÄS MER
2. The trends in the offline password-guessing field : Offline guessing attack on Swedish real-life passwords
Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : Password security is one of the most critical aspects of IT security, as password-based authentication is still the primary authentication method. Unfortunately, our passwords are subject to different types of weaknesses and various types of password-guessing attacks. LÄS MER
3. Lösenordspolicyer på populära webbsidor i Sverige. : En fallstudie för att undersöka lösenordspolicyer på 50 av de mest populära webbsidorna i Sverige.
Kandidat-uppsats, Jönköping University/JTH, Datateknik och informatikSammanfattning : Today, text-based password is one of the most common ways to verify login to a web page and to protect the account against theft. These password attacks are becoming more and more effective every year, which means that it is important not to let passwords be guessable. LÄS MER
4. Exploring the Number of Tries Related to Cracking Passwords Generated with Different Strategies
Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologiSammanfattning : As more services and workflows are moved into computerized systems the number of accounts a person has to be aware of is on steady increase. Today the average user is likely to have more than 25 accounts for different services used on a daily basis that all need authentication. LÄS MER
5. Leveraging an Active Directory for the Generation of Honeywords
Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknikSammanfattning : Honeywords, fake passwords that when used by an adversary are set to trigger an alarm, is one way of detecting security breaches. For them to be effective, however, they must resemble real passwords as closely as possible and thus, the construction of the honeywords is crucial. LÄS MER