Dissertations / Theses on the topic 'Factor Authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Factor Authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Miranda, Luís Henrique Fernandes Moura. "Context-aware multi-factor authentication." Master's thesis, Faculdade de Ciências e Tecnologia, 2009. http://hdl.handle.net/10362/4111.
Full textTellini, Niklas, and Fredrik Vargas. "Two-Factor Authentication : Selecting and implementing a two-factor authentication method for a digital assessment platform." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208097.
Full textFält, Markus. "Multi-factor Authentication : System proposal and analysis of continuous authentication methods." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39212.
Full textGarrett, Keith. "Vulnerabililty Analysis of Multi-Factor Authentication Protocols." UNF Digital Commons, 2016. http://digitalcommons.unf.edu/etd/715.
Full textReese, Kendall Ray. "Evaluating the Usability of Two-Factor Authentication." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6869.
Full textAlnajajr, Adeeb. "Hardware and user profiling for multi-factor authentication." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9030.
Full textChitiprolu, Jyothi. "Three Factor Authentication Using Java Ring and Biometrics." ScholarWorks@UNO, 2004. http://scholarworks.uno.edu/td/187.
Full textDutson, Jonathan William. "Managing Two-Factor Authentication Setup Through Password Managers." BYU ScholarsArchive, 2020. https://scholarsarchive.byu.edu/etd/8976.
Full textRoy, Graeme Stuart. "Usability engineering for code-based multi-factor authentication." Thesis, University of Edinburgh, 2013. http://hdl.handle.net/1842/11799.
Full textSINIGAGLIA, FEDERICO. "Security Analysis of Multi-Factor Authentication Security Protocols." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/1010670.
Full textPersson, Oskar, and Erik Wermelin. "A Theoretical Proposal of Two-Factor Authentication in Smartphones." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14691.
Full textAndriamilanto, Tompoariniaina Nampoina. "Leveraging browser fingerprinting for web authentication." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S045.
Full textBrasee, Kaleb. "Secure distributed single sign-on with two-factor authentication /." Connect to Online Resource-OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=toledo1195656733.
Full textBrasee, Kaleb D. "Secure Distributed Single Sign-On with Two-Factor Authentication." University of Toledo / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1195656733.
Full textHilm, David, and David Rahim. "Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey." Thesis, Linköpings universitet, Artificiell intelligens och integrerade datorsystem, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158642.
Full textAbbadi, Laith. "Multi-factor Authentication Techniques for Video Applications over the Untrusted Internet." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23413.
Full textEyers, Brandy Marie. "An Analysis of Remote Biometric Authentication with Windows." Scholar Commons, 2011. http://scholarcommons.usf.edu/etd/3096.
Full textAkif, Omar Zeyad. "Secure authentication procedures based on timed passwords, honeypots, honeywords and multi-factor techniques." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/16124.
Full textЛук’янова, О. М. "Аналіз методу двофакторної автентифікації на основі мобільного додатку для коригування звичок для ОС Android". Master's thesis, Сумський державний університет, 2019. http://essuir.sumdu.edu.ua/handle/123456789/76497.
Full textHumpolík, Jan. "Webová aplikace využívající vícefaktorovou autentizaci." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220282.
Full textBorgman, Isabelle. "Scan me – Ökad säkerhet med multifactor authentication : En undersökning om effekten vid ökad säkerhet i digitala identifierare." Thesis, Linnéuniversitetet, Institutionen för medieteknik (ME), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-54084.
Full textAl-Assam, Hisham. "Entropy evaluation and security measures for reliable single/multi-factor biometric authentication and biometric keys." Thesis, University of Buckingham, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.601453.
Full textMiles, Shaun Graeme. "An investigation of issues of privacy, anonymity and multi-factor authentication in an open environment." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1006653.
Full textVelthuis, Paul. "New authentication mechanism using certificates for big data analytic tools." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215694.
Full textKalibjian, Jeff. "Protecting Telemetry Data from Compromise Learning from the Mistakes of the Breached!" International Foundation for Telemetering, 2016. http://hdl.handle.net/10150/624239.
Full textBatie, Robert B. "Assessing the Effectiveness of a Fingerprint Biometric and a Biometric Personal Identification Number (BIO-PIN™) when used as a Multi-Factor Authentication Mechanism." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/992.
Full textRoshandel, Mehran [Verfasser], Jean-Pierre [Akademischer Betreuer] Seifert, Marian [Gutachter] Margraf, Niels [Gutachter] Pinkwart, and Slawomir [Gutachter] Stanczak. "Multi-factor authentication based on movement and gesture / Mehran Roshandel ; Gutachter: Marian Margraf, Niels Pinkwart, Slawomir Stanczak ; Betreuer: Jean-Pierre Seifert." Berlin : Technische Universität Berlin, 2017. http://d-nb.info/1156179548/34.
Full textCakir, Ece. "Single Sign-On : Risks and Opportunities of Using SSO (Single Sign-On) in a Complex System Environment with Focus on Overall Security Aspects." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-24377.
Full textAdeka, Muhammad I. "Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.
Full textMiceli, Christopher. "One Time Password Scheme Via Secret Sharing Techniques." ScholarWorks@UNO, 2011. http://scholarworks.uno.edu/td/1330.
Full textWiklund, Anton. "Masquerader Detection via 2fa Honeytokens." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-106964.
Full textEzeani, Callistus. "A Framework for MultiFactorAuthentication on Mobile Devices.- A Bayesian Approach." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-85984.
Full textBergvall, Ricardo. "Secure remote access to a work environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.
Full textBernhardsson, Karl. "Användning av privata E-legitimationer inom kommunal verksamhet." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20477.
Full textSharma, Seema. "Location Based Authentication." ScholarWorks@UNO, 2005. http://scholarworks.uno.edu/td/141.
Full textZakaria, Nur Haryani Binti. "Exploring human factors issues & possible countermeasures in password authentication." Thesis, University of Newcastle Upon Tyne, 2013. http://hdl.handle.net/10443/1810.
Full textAlhussain, Thamer Omar. "Factors Influencing the Adoption of Biometric Authentication in Mobile Government Security." Thesis, Griffith University, 2012. http://hdl.handle.net/10072/366143.
Full textJanahi, Yusuf M. A. M. "Factors affecting the adoption of Internet banking in the Kingdom of Bahrain." Thesis, University of Bradford, 2016. http://hdl.handle.net/10454/15884.
Full textMarnell, Joseph. "An Empirical Investigation of Factors Affecting Resistance to Using Multi-Method Authentication Systems in Public-Access Environments." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/970.
Full textMarnell, Joseph W. "An Empirical Investigation of Factors Affecting Resistance to Using Multi-Method Authentication Systems in Public-Access Environments." Thesis, Nova Southeastern University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10126659.
Full textPiva, Fabio Rogério 1982. "Addressing human factors in the design of cryptographic solutions = a two-case study in item validation and authentication." [s.n.], 2014. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275510.
Full textAl-Harby, Fahad Mohammed. "Biometric authentication systems for secured e-transactions in Saudi Arabia : an empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.
Full textAl-Harby, Fahad M. "Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.
Full textWang, Ting. "The Authentication of Whey Protein Powder Ingredients and Understanding Factors Regulating Astringency in Acidic Whey Protein Beverages to Estimate Astringency by Infrared Spectroscopy - An Instrumental Approach." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1398963463.
Full textLie, Henry Roes, and 李權衛. "Dynamic Multi-factor Authentication for Mobile Devices." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/71539643714693785527.
Full textHasmik, Badikyan. "Multi-Factor graphical user authentication for web applications." Master's thesis, 2017. http://hdl.handle.net/10198/14658.
Full textLin, Fang-Pen, and 林芳本. "Two-Factor Authentication Using Smartphone and Quick Response Code." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/f6g52s.
Full textWang, Cheng-sheng, and 王正昇. "A Two-Factor Authentication Mechanism in the Cloud Environment." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/04128707441666660301.
Full textJAIN, ANKIT KUMAR. "MULTI FACTOR MODEL FOR AUTHENTICATION IN SECURITY OF CLOUDS." Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15627.
Full textWang, Ying-Yu, and 王穎宇. "Parallel-AdaBoost Blink Detection for Live Face Recognition Authentication Systemand Its Embedded 4-Factor Authentication System Implementation." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/3t77ru.
Full text