To see the other types of publications on this topic, follow the link: Use of strong authentication.

Dissertations / Theses on the topic 'Use of strong authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 36 dissertations / theses for your research on the topic 'Use of strong authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Haraldsson, Emil. "Strong user authentication mechanisms." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2688.

Full text
Abstract:
<p>For Siemens Industrial Turbomachinery to meet its business objectives a modular authentication concept has to be implemented. Such a mechanism must be cost- effective while providing a well-balanced level of security, easy maintenance and be as user-friendly as possible. </p><p>Authenticating users securely involves the combination of two fields, theory of authentication mechanisms in information systems and human computer interaction. To construct a strong user authentication system the correlations of these fields has to be understood and provide guidance in the design. </p><p>Strong user
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Seema. "Location Based Authentication." ScholarWorks@UNO, 2005. http://scholarworks.uno.edu/td/141.

Full text
Abstract:
With the growth of wireless technologies in sectors like the military, aviation, etc, there is a need to determine the authenticity of a genuine user. Today's conventional authentication mechanisms are based on three factors: knowledge, possession and biometrics. These factors are prone to theft, hardware failure, expensive, etc. Consequently, there is a need of a stronger solution. One such solution is Location Based Authentication that considers the location information of a user. The location information is time based and thus hard to steal. However, accuracy of the GPS, signal str
APA, Harvard, Vancouver, ISO, and other styles
3

Kunning, Mao. "Strong Authentication Protocol using PIV Card with Mobile Devices." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128418.

Full text
Abstract:
Nowadays weak single-factor authentication mechanisms like passwords or passphrases are commonly used. Static passwords are easy to use, just remember them in mind. However it has many security weaknesses and even strong passwords are not strong enough. For example, strong secrets are difficult to remember, and people tend to share authentication credentials across systems, which reduce the overall security tremendously. Thus, for security sensitive environment we need strong multi-factors authentication. Smart card based certificate strong authentication solution can be used as a replacement
APA, Harvard, Vancouver, ISO, and other styles
4

Lunde, Lars, and Audun Wangensteen. "Using SIM for strong end-to-end Application Authentication." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9294.

Full text
Abstract:
<p>Today the Internet is mostly used for services that require low or none security. The commercial and governmental applications have started to emerge but met problems since they require strong authentication, which is both difficult and costly to realize. The SIM card used in mobile phones is a tamper resistant device that contains strong authentication mechanisms. It would be very convenient and cost-efficient if Internet services could use authentication methods based on the SIM. This master thesis presents an analysis and a design of a generic authentication system based on SIM, togethe
APA, Harvard, Vancouver, ISO, and other styles
5

Edwards, Benjamin. "On the use of Micro-Earthquakes to Predict Strong Ground-Motion." Thesis, University of Liverpool, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.490603.

Full text
Abstract:
Since the prediction of earthquakes is, at least at present. not possible, the understanding of energy propagation from an earthquake is important in terms of mitigating structural and human losses. The physical manifestation of an earthquake is ground shaking and it is this that ultimately causes structural failure, and in the worst case scenario. loss of life. A commonly used measure of damage likelihood to a particular structure is the peak ground acceleration or velocity (PGA or PGV respectively). Typically. the prediction of PGA and PGV from a particular earthquake scenario is performed t
APA, Harvard, Vancouver, ISO, and other styles
6

Mezzetti, Cristian. "Progettazione e implementazione di un servizio di autenticazione a più fattori per i servizi dell'ateneo." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/9593/.

Full text
Abstract:
I sistemi di autenticazione con secondo fattore permettono una migliore protezione dell'identità digitale degli utenti. Questo lavoro descrive l'analisi e progettazione della soluzione di autenticazione a più fattori da integrare nel sistema di Ateneo, conclusasi con lo sviluppo del modulo di integrazione tra il servizio di autenticazione Web Single Sign-On dell'Università di Bologna (ADFS 3.0) e la piattaforma scelta per la fornitura (Time4ID). L'integrazione è stata effettuata programmando un Authentication Provider, costituito da una libreria di integrazione scritta in C#, capace di integr
APA, Harvard, Vancouver, ISO, and other styles
7

Carbone, Felipe José. "Uma solução de autenticação forte para ambientes de saúde baseados em sensores." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/95674.

Full text
Abstract:
Equipamentos médicos equipados com interface de rede, classificados como sensores, transmitem informações sensíveis sobre a rede, constituindo uma rede de sensores. Essa rede pode ser utilizada para o acompanhamento remoto de pacientes a domicílio, com a finalidade de propiciar comodidade ao paciente. As informações provenientes desses sensores são vulneráveis, necessitando assim de fortes mecanismos de segurança. Devido às vulnerabilidades, métodos mais eficazes de autenticação vêm sendo desenvolvidos. Porém, as soluções de autenticação existentes obrigam a interação direta dos usuários com o
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Xi. "The Use of One-Time Password and RADIUS Authentication in a GSS-API Architecture." Thesis, KTH, Kommunikationssystem, CoS, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92210.

Full text
Abstract:
The Generic Security Service Application Program Interface (GSS-API) is an architecture that facilitates applications using distributed security services in a mechanism-independent fashion. GSS-API is supported by various underlying mechanisms and technologies such as Kerberos version 5 and public-key technologies. However, no one-time password based GSS-API mechanism existed. This thesis focuses on an investigation using one-time passwords together with RADIUS authentication as a protection facility for a GSS-API mechanism. This thesis presents a security architecture using one-time passwords
APA, Harvard, Vancouver, ISO, and other styles
9

Cowan, David Thomas. "Treatment of patients with chronic non-cancer pain : an investigation of strong opioid analgesic use." Thesis, King's College London (University of London), 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.396229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Edwards, Jared F. "Use of a pre-organizer and recall of the Strong Interest Inventory : does preparation improve memory? /." Available to subscribers only, 2006. http://proquest.umi.com/pqdweb?did=1212795351&sid=19&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Meyer, Hans K. "'net gains potential citizen journalists use traditional media often and have a strong need for news /." Diss., Columbia, Mo. : University of Missouri-Columbia, 2006. http://hdl.handle.net/10355/4578.

Full text
Abstract:
Thesis (M.A.) University of Missouri-Columbia, 2006.<br>The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on August 30, 2007) Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
12

Guiddy, Lainie M. "Weak versus strong a comparative study of gender and adjective use in Sports illustrated articles from 1970-2003 /." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Astray-Caneda, Evelio E. III. "Hazard Mitigation Element Quality in Coastal Comprehensive Plans in a State with Strong Requirements for Hazard Mitigation Plan Elements." FIU Digital Commons, 2013. http://digitalcommons.fiu.edu/etd/843.

Full text
Abstract:
This dissertation examines the quality of hazard mitigation elements in a coastal, hazard prone state. I answer two questions. First, in a state with a strong mandate for hazard mitigation elements in comprehensive plans, does plan quality differ among county governments? Second, if such variation exists, what drives this variation? My research focuses primarily on Florida’s 35 coastal counties, which are all at risk for hurricane and flood hazards, and all fall under Florida’s mandate to have a comprehensive plan that includes a hazard mitigation element. Research methods included document re
APA, Harvard, Vancouver, ISO, and other styles
14

Hsieh, Christine L. (Christine Lih). "The use of strong personal media in the context of chronic disease treatment : music as a mediator of depression and pain experience." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/83967.

Full text
Abstract:
Thesis (Ph. D.)--Harvard-MIT Program in Health Sciences and Technology, 2013.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references.<br>Introduction: It is postulated that music has been part of society for at least 50,000 years, since the time that humans lived in one location of the world before dispersing across the globe (44). Over the eras it evolved in its manifestation, from classical performances enjoyed only by the elite, to soulful songs sung in the fields, to myriad forms of expression to be used by anyone. Today, its prominence has even evolved into being
APA, Harvard, Vancouver, ISO, and other styles
15

Bhamra, Sukvinder. "Investigating the use and identity of traditional herbal remedies amongst South Asian communities using surveys and biomolecular techniques." Thesis, De Montfort University, 2016. http://hdl.handle.net/2086/12392.

Full text
Abstract:
Herbal medicines (HMs) have been used to supplement, maintain, and treat health conditions, and have inspired the development of many Western pharmaceuticals. Migrant South Asian (SA) communities in the UK have brought with them their own traditional forms of medicine, yet little is known about their current use of HMs in the UK. Consuming HMs alongside conventional Western medicines could affect pharmacological treatment and lead to herb-drug interactions; hence, healthcare professionals (HCPs) should be aware of their patients’ use of HMs. The import of HMs to the UK raises concerns over the
APA, Harvard, Vancouver, ISO, and other styles
16

Els, Rene. "A retrospective review of strong opioid use in the last 6 days of life of patients with HIV/AIDS or cancer at the in-patients unit of St. Francis Hospice." Master's thesis, University of Cape Town, 2004. http://hdl.handle.net/11427/12579.

Full text
Abstract:
Bibliography: leaves 101-108.<br>The study was prompted by nursing concern at St Francis Hospice that, in HIV-positive patients, the use of opioids for symptom-control may shorten life, while I felt that pain was not recognized and therefore analgesia was withheld until the HIV-positive patients were close to their natural death. Objective: To compare pain control and sedation practices for terminally ill patients with HIV or cancer.
APA, Harvard, Vancouver, ISO, and other styles
17

Hirai, Tatsuya. "A Study on Access Control Mechanism in Storage Devices for Audiovisual Contents." 京都大学 (Kyoto University), 2016. http://hdl.handle.net/2433/216162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Chiang, Min-Hung, and 江旻紘. "Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/72920323916029131574.

Full text
Abstract:
碩士<br>輔仁大學<br>資訊工程學系<br>93<br>Authentication using passwords is a popular approach often used today to authenticate users logining any kind of server. Password authentication involves the requesting entity, a user, providing a secret to the receiving entity, a server, which then checks the secret against a value recorded earlier to confirm the authenticity of the user. Conventional static password authentication schemes are vulnerable to direct wiretapping attacks, and therefore are unsuitable for open network environments. To meet today’s security requirements, one-time (or dynamic) password
APA, Harvard, Vancouver, ISO, and other styles
19

Perez, Luís Paulo Lemos. "Seamless and Strong Authentication on Mobile Devices Based on User Activity." Master's thesis, 2015. http://hdl.handle.net/10400.6/6010.

Full text
Abstract:
In 2015, the number of mobile devices (e.g., smartphones, tablets, phablets, etc.) exceeded the number of physical computers worldwide. The physical characteristics of these devices are constantly evolving. Increased autonomy, storage and processing capacity, as well as functionality are factors that lead people to buy more and more of these devices. There are thousands of applications for many different areas, that can be can be installed and used on daily-basis, ranging from finantial applications, to health, games, movies, and utilities, etc. Users increasingly rely on these devices,
APA, Harvard, Vancouver, ISO, and other styles
20

Choi, Taehwan. "Weak and strong authentication in computer networks." 2012. http://hdl.handle.net/2152/19532.

Full text
Abstract:
In this dissertation, we design and analyze five authentication protocols that answer to the a firmative the following fi ve questions associated with the authentication functions in computer networks. 1. The transport protocol HTTP is intended to be lightweight. In particular, the execution of applications on top of HTTP is intended to be relatively inexpensive and to take full advantage of the middle boxes in the Internet. To achieve this goal, HTTP does not provide any security guarantees, including any authentication of a server by its clients. This situation raises the following question
APA, Harvard, Vancouver, ISO, and other styles
21

Tong, Yi-Wen, and 童翊文. "Efficient Strong Anonymous Authentication Scheme for Wireless Communications." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/08607824156415914530.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊工程學系研究所<br>100<br>Because of the popularity of wireless communication technologies, people can access servers without the restriction of place and time. With the rapid development of mobile devices, such as smart phones and iPads, the frequency of wireless networks have increased. Roaming services ensure service provision without location constraints. A secure roaming authentication protocol is critical for the security and privacy of users when accessing services by roaming. It ensures the authenticity of mobile users, and foreign and home servers. After authentication, the
APA, Harvard, Vancouver, ISO, and other styles
22

Lin, Ching-Ying, and 林晶瑩. "A Study of Strong Password Authentication Scheme for Smart Cards." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/8gk8m4.

Full text
Abstract:
碩士<br>朝陽科技大學<br>網路與通訊研究所<br>94<br>As Internet becomes more and more popular in recent years, network applications also become more vary. Thus, people have many opportunities to access the resources at the remote servers. User authentication is the first door of network security. However, Internet is an open environment, messages may subject to intercept, copy, alter, or forgery from malicious attackers. Therefore, it is important to design an efficient and secure user authentication scheme to withstand all network attacks. User authentication mechanisms have been extensively developed, the pas
APA, Harvard, Vancouver, ISO, and other styles
23

Belanger, David. "Use-Bounded Strong Reducibilities." Thesis, 2009. http://hdl.handle.net/10012/4564.

Full text
Abstract:
We study the degree structures of the strong reducibilities $(\leq_{ibT})$ and $(\leq_{cl})$, as well as $(\leq_{rK})$ and $(\leq_{wtt})$. We show that any noncomputable c.e. set is part of a uniformly c.e. copy of $(\BQ,\leq)$ in the c.e. cl-degrees within a single wtt-degree; that there exist uncountable chains in each of the degree structures in question; and that any countable partially-ordered set can be embedded into the cl-degrees, and any finite partially-ordered set can be embedded into the ibT-degrees. We also offer new proofs of results of Barmpalias and Lewis-Barmpalias concernin
APA, Harvard, Vancouver, ISO, and other styles
24

Fuller, Benjamin Woodbury. "Strong key derivation from noisy sources." Thesis, 2015. https://hdl.handle.net/2144/15636.

Full text
Abstract:
A shared cryptographic key enables strong authentication. Candidate sources for creating such a shared key include biometrics and physically unclonable functions. However, these sources come with a substantial problem: noise in repeated readings. A fuzzy extractor produces a stable key from a noisy source. It consists of two stages. At enrollment time, the generate algorithm produces a key from an initial reading of the source. At authentication time, the reproduce algorithm takes a repeated but noisy reading of the source, yielding the same key when the two readings are close. For ma
APA, Harvard, Vancouver, ISO, and other styles
25

Pan, Zih-Jyun, and 潘姿均. "A Delegation-Based Authentication Protocol for Use in Artistic Authorization Environment." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/vh8h49.

Full text
Abstract:
碩士<br>國立臺中科技大學<br>資訊管理系碩士班<br>100<br>This research applies the technique of proxy signature to provide the solution for the following problem in the artistic authorization environment: A consumer how to tell the product that he/she bought from a design company in the internet is actually from the original creator who authorized the design company to design the product in which the original creator’s artistic creation inside. For example, a famous painter authorizes a design company to produce a product such as a cup, notebook or wallet in which his/her own paint inside. The product was digita
APA, Harvard, Vancouver, ISO, and other styles
26

Malkhuuz, Ganbold. "The use of strong brine and HCl solutions to process nickel sulfide concentrates." Thesis, 2006. http://hdl.handle.net/2429/18061.

Full text
Abstract:
The mixture of hydrochloric acid and magnesium chloride is a good lixiviant for the processing of sulfide minerals, concentrates and matte samples. The proton activity in this mixture deviates positively from ideal activity. This enhances the leaching power to break sulfide lattices down and to dissolve metals into solution. Magnesium (chloride) was chosen because it is one of a few reusable salts among alkali and alkali earth metal chlorides. The thermodynamic properties of this mixture are best characterized by activity coefficients of contributing ions in solution. The activity coefficient
APA, Harvard, Vancouver, ISO, and other styles
27

"Molecular authentication of epimedium species and the anti-osteoporosis effect of herba epimedii." 2004. http://library.cuhk.edu.hk/record=b6073725.

Full text
Abstract:
Sun Ye.<br>"November 2004."<br>Thesis (Ph.D.)--Chinese University of Hong Kong, 2004.<br>Includes bibliographical references (p. 205-225)<br>Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.<br>Electronic reproduction. Ann Arbor, MI : ProQuest Information and Learning Company, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.<br>Mode of access: World Wide Web.<br>Abstracts in English and Chinese.
APA, Harvard, Vancouver, ISO, and other styles
28

Lin, Hsiao-Wei, and 林孝維. "Use Fourier amplitude spectrum ratio method to analyze sites of strong-motion stations in Taiwan." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/39111652199280795501.

Full text
Abstract:
碩士<br>國立中央大學<br>地球物理研究所<br>92<br>In this study we use TSMIP strong-motion station records to analyze the site effects of stations in taiwan.We choose earthquake events from 1998/08 to 2000/12 and restricts the earthquake parameter in depth < 50 Km and recorded station over than 100.We analyze these records in two ways:1.whole taiwan effects and 2.each TSMIP divided region.And we finally divide all TSMIP station into four groups:1.Fourier amplitude spectrum ratio larger than 1 at frequency less than 1 Hz;2.Fourier amplitude spectrum ratio larger than 1 between frequency 1hz to 10 hz;3.Fourier a
APA, Harvard, Vancouver, ISO, and other styles
29

"Molecular authentication and phylogenetic studies of Chinese herbs." 2009. http://library.cuhk.edu.hk/record=b5896914.

Full text
Abstract:
Wang, Yanli.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2009.<br>Includes bibliographical references (leaves 90-104).<br>In English with some Chinese characters; abstract also in Chinese.<br>Acknowledgement --- p.I<br>Abstract --- p.III<br>摘要 --- p.V<br>Table of Content --- p.VII<br>List of Figures --- p.XIII<br>List of Tables --- p.XV<br>Abbreviations --- p.XVI<br>Chapter Chapter 1. --- Introduction --- p.1<br>Chapter 1.1. --- Traditional Chinese Medicine (TCM) --- p.1<br>Chapter 1.2. --- The development history and present situation of Traditional Chinese Medicine --- p.
APA, Harvard, Vancouver, ISO, and other styles
30

"Molecular authentication, intestinal absorption and in vitro metabolic studies of the major active ingredients of Rhizoma chuanxiong." Thesis, 2005. http://library.cuhk.edu.hk/record=b6074231.

Full text
Abstract:
Bi-directional transport studies in SimBioDASRTM and Caco-2 cells were employed to examine the transport profiles of Buph, Ligs and SenA. Apical to basolateral (A-B) transport studies of the tested compounds revealed high intestinal permeability and predicted human absorption of over 98%. Permeability ratio of B-A/A-B of Buph (0.7-1.3) and Ligs (0.8-1.2) indicated that they were transported by passive transcellular and paracellular pathways while the low B-A/A-B ratio of SenA may imply possible involvement of other transport mechanisms. One metabolite (M-1) generated from hydration of Buph was
APA, Harvard, Vancouver, ISO, and other styles
31

"A secure one-use dynamic backdoor password system based on public key cryptography." 2002. http://library.cuhk.edu.hk/record=b5891253.

Full text
Abstract:
Yu Haitao.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2002.<br>Includes bibliographical references (leaves 71).<br>Abstracts in English and Chinese.<br>Chapter Chapter 1. --- Introduction --- p.1<br>Chapter 1.1 --- Introduction --- p.1<br>Chapter 1.2 --- Thesis organization --- p.6<br>Chapter Chapter 2. --- Conventional password authentication and backdoor password schemes --- p.7<br>Chapter 2.1 --- Password and password authentication --- p.7<br>Chapter 2.1.1 --- Introduction to password and its security problems --- p.7<br>Chapter 2.1.2 --- Front-door passwords vs. backdoor
APA, Harvard, Vancouver, ISO, and other styles
32

Hovorková, Nikola. "Právní regulace platebního styku." Master's thesis, 2020. http://www.nusl.cz/ntk/nusl-436373.

Full text
Abstract:
1 Abstract Legal regulation of payments The thesis deals with the topic of legal regulation of the payment transactions, which is an indispensable part of the economic life of each of us today. The right setting of the operation of the payment system ensures and directly influences the efficiency of economic exchange, whether at the national or international level, in cash or non-cash forms. Not only because of the importance of economic exchange, the thesis pays the main attention to the regulation of funds, i.e. of banknotes and coins, scriptural money as well as electronic money. The thesis
APA, Harvard, Vancouver, ISO, and other styles
33

Grace, Olwen Megan. "Bark in traditional healthcare in KwaZulu-Natal, South Africa : usage, authentication and sustainability." Thesis, 2002. http://hdl.handle.net/10413/8574.

Full text
Abstract:
Healthcare in South Africa is polarised between western and traditional African systems of therapy. The latter is consulted by the majority of the population and therefore plays an integral role in the delivery of healthcare to South Africans. Traditional medicines are primarily plant products with long storage lives, among which the dominance of bark is typical of southern African traditional healthcare systems. Expansion of the traditional healthcare sector during the twentieth century, in response to rising consumer demands, stimulated a lucrative trade in medicinal plants that is centred i
APA, Harvard, Vancouver, ISO, and other styles
34

Jun, Najin. "Strong-tie diversity and weak-tie diversity : the paradoxical roles of Internet use and political tolerance in supporting political diversity and participation." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-12-4769.

Full text
Abstract:
The purpose of this study is: 1) to explore the ways in which the Internet may affect individuals’ political diversity in different strengths of social relationships; 2) to identify which of strong-tie diversity and weak-tie diversity contributes more to political tolerance; and 3) to investigate the extent to which tolerant people are different from the less tolerant in their participation decisions when exposed to political diversity. In order to examine the contribution of Internet news use to political heterogeneity, the current study examines the moderation of the negative influence of po
APA, Harvard, Vancouver, ISO, and other styles
35

Havlíková, Nikola. "Zajištění bezpečnosti online platebních služeb." Master's thesis, 2019. http://www.nusl.cz/ntk/nusl-404703.

Full text
Abstract:
Ensuring security of online payment services Abstract The thesis is devoted to the topic of ensuring security of online payment services, especially in the context of identification and authentication of the client in the Internet when performing acts related to the provision of payment services. The issue of the customer identity is described especially in the context of know your customer principle governed by legal regulation in the area of combating money laundering and financing of terrorism, and in the context of the obligation to carry out a strong customer authentication (SCA) brought
APA, Harvard, Vancouver, ISO, and other styles
36

America, Kirby. "Twitter as an influence on the quality of online interpersonal relationships and language use." 2013. http://hdl.handle.net/11394/3207.

Full text
Abstract:
Magister Artium - MA<br>Social networking sites are used on a daily basis, to communicate with friends we have known for quite some time as well as make new friends from all over the globe - a global phenomenon. According to Aparicio (2011) the use of social networking sites have given way to a new “social dynamic” where friendships are formed with individuals from diverse backgrounds and geographical locations. Larsen (2007) continues to state that social network sites make for the creation of new friendships and the maintenance of new relationships. Using social networking sites to develop r
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!