Computer security is a growing field in the IT industry. One of the important aspects of the computer security is authentication. Using passwords (something you know) is one of the most common ways of authentications. But passwords have proven to provide weak level of security as they can be easily compromised. Some other ways of authenticating a user are using physical tokens, (something you possess) and biometrics, (something you are). Using any one of these techniques to secure a system always has its own set of threats. One way to make sure a system is secure is to use multiple factors to authenticate. One of the ways to use multiple factors is to use all the three factors of authentication, something you possess, something you...
Dissertation presented as partial requirement for obtaining the Master’s degree in Information Manag...
The transcription activator-like effectors (TALE) are the largest family of the type III effector pr...
Intrusion Detection is a broad and complex field in cybersecurity. There are varieties of existing m...
Many organizations today are seeking to improve security by implementing multi-factor authentication...
Many difficulties in metal machining arise from the precision required by the customer, as well as t...
This project documents the attempted implementation of a new optically stimulated luminescence (OSL)...
B-trees are widely used in management of data to support good performance for storage, retrievals an...
abstract: Digital to analog converters (DACs) find widespread use in communications equipment. Most ...
The long-term goal of this project is to create a shoe pad with embedded sensitive electronics which...
Security is one of the major issues in any network and on the Internet. It encapsulates many differe...
This research explores how read alouds may support a Pre-Kindergarten student’s emergent literacy sk...
A simple model for the transport of minority holes in Cadmium Selenide (CdSe) solar cells is present...
This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelo...
This thesis is submitted in a partial fulfillment of the requirement for the degree of Bachelor of S...
The 2018 Verizon Data Breach Investigation report indicates that over 90% of common breaches start w...
Dissertation presented as partial requirement for obtaining the Master’s degree in Information Manag...
The transcription activator-like effectors (TALE) are the largest family of the type III effector pr...
Intrusion Detection is a broad and complex field in cybersecurity. There are varieties of existing m...
Many organizations today are seeking to improve security by implementing multi-factor authentication...
Many difficulties in metal machining arise from the precision required by the customer, as well as t...
This project documents the attempted implementation of a new optically stimulated luminescence (OSL)...
B-trees are widely used in management of data to support good performance for storage, retrievals an...
abstract: Digital to analog converters (DACs) find widespread use in communications equipment. Most ...
The long-term goal of this project is to create a shoe pad with embedded sensitive electronics which...
Security is one of the major issues in any network and on the Internet. It encapsulates many differe...
This research explores how read alouds may support a Pre-Kindergarten student’s emergent literacy sk...
A simple model for the transport of minority holes in Cadmium Selenide (CdSe) solar cells is present...
This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelo...
This thesis is submitted in a partial fulfillment of the requirement for the degree of Bachelor of S...
The 2018 Verizon Data Breach Investigation report indicates that over 90% of common breaches start w...
Dissertation presented as partial requirement for obtaining the Master’s degree in Information Manag...
The transcription activator-like effectors (TALE) are the largest family of the type III effector pr...
Intrusion Detection is a broad and complex field in cybersecurity. There are varieties of existing m...