Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

Dept: Information and Communication Technology (ICT)

You searched for subject:(authentication). Showing records 1 – 12 of 12 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


KTH

1. Mumtaz, Majid. Security Services for Mobile Applications.

Degree: Information and Communication Technology (ICT), 2012, KTH

  In today's era of technology, information can revolve the whole world within seconds via Internet. Devices such as smartphones, tablets and smart applications running… (more)

Subjects/Keywords: Mobile Applications Security; Authentication; microSD; Secure Element

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mumtaz, M. (2012). Security Services for Mobile Applications. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mumtaz, Majid. “Security Services for Mobile Applications.” 2012. Thesis, KTH. Accessed October 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mumtaz, Majid. “Security Services for Mobile Applications.” 2012. Web. 18 Oct 2019.

Vancouver:

Mumtaz M. Security Services for Mobile Applications. [Internet] [Thesis]. KTH; 2012. [cited 2019 Oct 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mumtaz M. Security Services for Mobile Applications. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

2. Jakobsson, Anders. Secure Authentication in Near Field Communication based Access Control Systems.

Degree: Information and Communication Technology (ICT), 2015, KTH

  Today there exist a myriad of different types of access control systems that use asmart card or mobile device as a key. The mobile… (more)

Subjects/Keywords: NFC; SRP; Authentication; Android; Raspberry Pi; NXP; NFC; SRP; Authentication; Android; Raspberry Pi; NXP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jakobsson, A. (2015). Secure Authentication in Near Field Communication based Access Control Systems. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-175763

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jakobsson, Anders. “Secure Authentication in Near Field Communication based Access Control Systems.” 2015. Thesis, KTH. Accessed October 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-175763.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jakobsson, Anders. “Secure Authentication in Near Field Communication based Access Control Systems.” 2015. Web. 18 Oct 2019.

Vancouver:

Jakobsson A. Secure Authentication in Near Field Communication based Access Control Systems. [Internet] [Thesis]. KTH; 2015. [cited 2019 Oct 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-175763.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jakobsson A. Secure Authentication in Near Field Communication based Access Control Systems. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-175763

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

3. Velthuis, Paul. New authentication mechanism using certificates for big data analytic tools.

Degree: Information and Communication Technology (ICT), 2017, KTH

  Companies analyse large amounts of sensitive data on clusters of machines, using a framework such as Apache Hadoop to handle inter-process communication, and big… (more)

Subjects/Keywords: Cloud Access Management; certificate on demand; Apache Spark; Apache Flink; Kerberos; transport security layer (TLS); Authentication; Multi Factor Authentication; Authentication for data analytic tools; certificate based Spark authentication; public key encryption; distributed authentication; short valid authentication; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Velthuis, P. (2017). New authentication mechanism using certificates for big data analytic tools. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215694

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Velthuis, Paul. “New authentication mechanism using certificates for big data analytic tools.” 2017. Thesis, KTH. Accessed October 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215694.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Velthuis, Paul. “New authentication mechanism using certificates for big data analytic tools.” 2017. Web. 18 Oct 2019.

Vancouver:

Velthuis P. New authentication mechanism using certificates for big data analytic tools. [Internet] [Thesis]. KTH; 2017. [cited 2019 Oct 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215694.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Velthuis P. New authentication mechanism using certificates for big data analytic tools. [Thesis]. KTH; 2017. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215694

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

4. Desta, Girmay. Security for Mobile Payment Transaction.

Degree: Information and Communication Technology (ICT), 2012, KTH

  The advancement of ICT in a variety of sectors helped in improving the time consuming and rigid service into fast and flexible service that… (more)

Subjects/Keywords: Strong Authentication; mobile security; PIV; mobile PKI; payment privacy; EMV security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Desta, G. (2012). Security for Mobile Payment Transaction. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Desta, Girmay. “Security for Mobile Payment Transaction.” 2012. Thesis, KTH. Accessed October 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Desta, Girmay. “Security for Mobile Payment Transaction.” 2012. Web. 18 Oct 2019.

Vancouver:

Desta G. Security for Mobile Payment Transaction. [Internet] [Thesis]. KTH; 2012. [cited 2019 Oct 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Desta G. Security for Mobile Payment Transaction. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

5. Kunning, Mao. Strong Authentication Protocol using PIV Card with Mobile Devices.

Degree: Information and Communication Technology (ICT), 2013, KTH

  Nowadays weak single-factor authentication mechanisms like passwords or passphrases are commonly used. Static passwords are easy to use, just remember them in mind. However… (more)

Subjects/Keywords: Mobile Applications Security; Strong Authentication; Smart Card

…for the distribution, activation, and reuse of tokens for strong mobile authentication. Soft… …solutions for certificate–based strong authentication protocol implemented in Java, and a mobile… …smart cards in users’ hands and process authentication in a secure way. 1.2 Limitations In… …card and for achieving remote authentication the solution is based on FIPS 196 entity… …authentication protocol [7]. 1.4 Report organization This report comprises the following… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kunning, M. (2013). Strong Authentication Protocol using PIV Card with Mobile Devices. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kunning, Mao. “Strong Authentication Protocol using PIV Card with Mobile Devices.” 2013. Thesis, KTH. Accessed October 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kunning, Mao. “Strong Authentication Protocol using PIV Card with Mobile Devices.” 2013. Web. 18 Oct 2019.

Vancouver:

Kunning M. Strong Authentication Protocol using PIV Card with Mobile Devices. [Internet] [Thesis]. KTH; 2013. [cited 2019 Oct 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kunning M. Strong Authentication Protocol using PIV Card with Mobile Devices. [Thesis]. KTH; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

6. Kukuruzovic, Naida. Security Management : Fulfillment of the Government Requirements for a component assurance process.

Degree: Information and Communication Technology (ICT), 2016, KTH

Protecting organization’s assets from various security threats is a necessity for every organization. Efficient security management is vital to effectively protect the organization’s assets.… (more)

Subjects/Keywords: Security management; information security; authentication; authorization; governance; risk management; compliance; user management; Säkerhetshantering; informationssäkerhet; autentisering; auktorisering; styrning; riskhantering; följsamhet; användaradministration; Communication Systems; Kommunikationssystem; Computer Sciences; Datavetenskap (datalogi); Computer Engineering; Datorteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kukuruzovic, N. (2016). Security Management : Fulfillment of the Government Requirements for a component assurance process. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kukuruzovic, Naida. “Security Management : Fulfillment of the Government Requirements for a component assurance process.” 2016. Thesis, KTH. Accessed October 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kukuruzovic, Naida. “Security Management : Fulfillment of the Government Requirements for a component assurance process.” 2016. Web. 18 Oct 2019.

Vancouver:

Kukuruzovic N. Security Management : Fulfillment of the Government Requirements for a component assurance process. [Internet] [Thesis]. KTH; 2016. [cited 2019 Oct 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kukuruzovic N. Security Management : Fulfillment of the Government Requirements for a component assurance process. [Thesis]. KTH; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. Khan, Rasib Hassan. Decentralized Authentication in OpenStack Nova : Integration of OpenID.

Degree: Information and Communication Technology (ICT), 2011, KTH

The evolution of cloud computing is driving the next generation of internet services. OpenStack is one of the largest open-source cloud computing middleware development… (more)

Subjects/Keywords: Authentication; EC2API; OpenID; OpenStack Nova; OSAPI; Security; TECHNOLOGY; TEKNIKVETENSKAP

…8 2.3.2 Authentication and Authorization Framework . . . . 10 2.3.2.1 User Credentials… …28 3.2 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 29 3.3… …Security in OpenID . . . . . . . . . . . . . . . . . . . . . . . 32 3.4 Other Authentication… …Design Concept . . . . . . . . . . . . . . . . 37 4.3.2 OpenID Authentication Service API… …5.1.4 Architectural Consideration . . . . . . . . . . . . . . 45 5.2 OpenID Authentication… 

Page 1 Page 2 Page 3 Page 4 Page 5

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khan, R. H. (2011). Decentralized Authentication in OpenStack Nova : Integration of OpenID. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-47888

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khan, Rasib Hassan. “Decentralized Authentication in OpenStack Nova : Integration of OpenID.” 2011. Thesis, KTH. Accessed October 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-47888.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khan, Rasib Hassan. “Decentralized Authentication in OpenStack Nova : Integration of OpenID.” 2011. Web. 18 Oct 2019.

Vancouver:

Khan RH. Decentralized Authentication in OpenStack Nova : Integration of OpenID. [Internet] [Thesis]. KTH; 2011. [cited 2019 Oct 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-47888.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khan RH. Decentralized Authentication in OpenStack Nova : Integration of OpenID. [Thesis]. KTH; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-47888

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

8. Engström, Pontus. Modernizing forms at KTH : Using Digital Signatures.

Degree: Information and Communication Technology (ICT), 2016, KTH

Today both government agencies and companies struggle to keep up with the pace of the continuous change of technology. With all new technology there… (more)

Subjects/Keywords: Authentication; cryptography; digital signature; digital certificate; X.509; Adobe Acrobat; LDAP; application form; Autentisering; kryptografi; digitala signaturer; digitala certifikat; X.509; Adobe Acrobat; LDAP; ansökningsblankett; Communication Systems; Kommunikationssystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Engström, P. (2016). Modernizing forms at KTH : Using Digital Signatures. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193898

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Engström, Pontus. “Modernizing forms at KTH : Using Digital Signatures.” 2016. Thesis, KTH. Accessed October 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193898.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Engström, Pontus. “Modernizing forms at KTH : Using Digital Signatures.” 2016. Web. 18 Oct 2019.

Vancouver:

Engström P. Modernizing forms at KTH : Using Digital Signatures. [Internet] [Thesis]. KTH; 2016. [cited 2019 Oct 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193898.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Engström P. Modernizing forms at KTH : Using Digital Signatures. [Thesis]. KTH; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193898

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

9. Bharath, Tati. A framework to implement delegation in offline PACS : A strategy to restrict user’s path.

Degree: Information and Communication Technology (ICT), 2013, KTH

  Physical access control systems (PACS) deal with the security of the availability of resources. They work as an alternative to traditional manual security access… (more)

Subjects/Keywords: smart card authentication; offline physical access control; delegation; shared secret keys; design science

…Service EAP Extensible Authentication Protocol ECC Elliptic Curve Cryptography HID… …access control system solves the problems of authorization, authentication and validation… …authentication verifies the identity the user claims and validation verifies the authorized privileges… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bharath, T. (2013). A framework to implement delegation in offline PACS : A strategy to restrict user’s path. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127851

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bharath, Tati. “A framework to implement delegation in offline PACS : A strategy to restrict user’s path.” 2013. Thesis, KTH. Accessed October 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127851.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bharath, Tati. “A framework to implement delegation in offline PACS : A strategy to restrict user’s path.” 2013. Web. 18 Oct 2019.

Vancouver:

Bharath T. A framework to implement delegation in offline PACS : A strategy to restrict user’s path. [Internet] [Thesis]. KTH; 2013. [cited 2019 Oct 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127851.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bharath T. A framework to implement delegation in offline PACS : A strategy to restrict user’s path. [Thesis]. KTH; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127851

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Yesmin, Sabina. Mobile Application for Secure Healthcare System.

Degree: Information and Communication Technology (ICT), 2013, KTH

  Usage of mobile applications and wireless networks is growing rapidly at different sectors in the world. Mobile healthcare application is devotedly accepted by the… (more)

Subjects/Keywords: Mobile healthcare; wireless network; security; privacy; encryption; authentication and data confidentiality.

…5 2.2.1 Authentication… …22 3.3.1 Message Flow for Authentication… …Mutual Authentication Protocol [20]… …20 Figure 3.3 Message Flow for Authentication… …Authentication Code RSA - Rivest, Shamir and Adleman PKI – Public Key Infrastructure SHA - Secure Hash… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yesmin, S. (2013). Mobile Application for Secure Healthcare System. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127456

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yesmin, Sabina. “Mobile Application for Secure Healthcare System.” 2013. Thesis, KTH. Accessed October 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127456.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yesmin, Sabina. “Mobile Application for Secure Healthcare System.” 2013. Web. 18 Oct 2019.

Vancouver:

Yesmin S. Mobile Application for Secure Healthcare System. [Internet] [Thesis]. KTH; 2013. [cited 2019 Oct 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127456.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yesmin S. Mobile Application for Secure Healthcare System. [Thesis]. KTH; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127456

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

11. Topal, Baran. Comparison of Methods of Single Sign-On : Post authentication methods in single sign on.

Degree: Information and Communication Technology (ICT), 2016, KTH

Single sign-on (SSO) is a session verification mechanism that allows a client to use a single password and name combination to be able to… (more)

Subjects/Keywords: SSO; Single sign-on; SAML; authentication; security; behavior; risk; SSO; Single sign-on; SAML; autentisering; säkerhet; beteende; risk; Communication Systems; Kommunikationssystem

…flow of authentication .............................. 13 2.3.6 Shibboleth: An Example SSO… …System ............................ 14 2.4 2.5 Post Authentication Methods… …15 Well-known Authentication Methods and their Shortcomings… …Authentication ........................................... 17 2.6 2.7 2.8 Post Authentication… …18 Challenge Handshake Authentication Protocol (CHAP) ........ 20 Real Time User… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Topal, B. (2016). Comparison of Methods of Single Sign-On : Post authentication methods in single sign on. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-183144

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Topal, Baran. “Comparison of Methods of Single Sign-On : Post authentication methods in single sign on.” 2016. Thesis, KTH. Accessed October 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-183144.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Topal, Baran. “Comparison of Methods of Single Sign-On : Post authentication methods in single sign on.” 2016. Web. 18 Oct 2019.

Vancouver:

Topal B. Comparison of Methods of Single Sign-On : Post authentication methods in single sign on. [Internet] [Thesis]. KTH; 2016. [cited 2019 Oct 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-183144.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Topal B. Comparison of Methods of Single Sign-On : Post authentication methods in single sign on. [Thesis]. KTH; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-183144

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Tellini, Niklas. Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform.

Degree: Information and Communication Technology (ICT), 2017, KTH

Two-Factor Authentication (2FA) is a two-step verification process that aims to provide an additional layer of security by requiring the user to authenticate himself/herself… (more)

Subjects/Keywords: Two-Factor Authentication; Security; One-Time Passwords; Access control; Digital Assessment Platform; Två-stegs autentisering; Säkerhet; Engångslösenord; Åtkomst kontroll; Digital bedömningsplattform; Communication Systems; Kommunikationssystem

Authentication Factors ............................................................. 11 2.1.1 Knowledge… …2.2 Types of Authentication and Levels of Assurance ................. 17 2.2.1 Types of… …Authentication .................................................. 17 2.2.2 Levels of Assurance… …22 2.4.5 Authentication of students in online learning environments… …Economics of authentication systems ............................. 23 3 Methodologies and Methods… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tellini, N. (2017). Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208097

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tellini, Niklas. “Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform.” 2017. Thesis, KTH. Accessed October 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208097.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tellini, Niklas. “Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform.” 2017. Web. 18 Oct 2019.

Vancouver:

Tellini N. Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform. [Internet] [Thesis]. KTH; 2017. [cited 2019 Oct 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208097.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tellini N. Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform. [Thesis]. KTH; 2017. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208097

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.