Linkopings universitet

Displaying 1-3 of 3 results

  • White Papers // Jul 2010

    Security Levels for Web Authentication using Mobile Phones

    Mobile phones offer unique advantages for secure authentication: they are small and portable, provide multiple data transfer channels, and are nearly ubiquitous. While phones provide a flexible and capable platform, phone designs vary, and the security level of an authentication solution is influenced by the choice of channels and authentication...

    Provided By Linkopings universitet

  • White Papers // May 2009

    Defense Against DoS, Flooding Attacks

    The following paper concentrates on the means of defense against denial of service attacks. First, some possible and common denial of service attacks are described to give the reader a basic understanding of what is this type of the attacks. The main part of the project is the mechanism, tools...

    Provided By Linkopings universitet

  • White Papers // May 2009

    Firewall Implementation and Testing

    Almost every machine on the internet today is protected by a firewall. Many of them are misconfigured which is seldom discovered due to poor testing. This paper summarizes the experiences in setting up and testing one's own firewall, as well as performing a penetration attack from an external machine to...

    Provided By Linkopings universitet

  • White Papers // May 2009

    Defense Against DoS, Flooding Attacks

    The following paper concentrates on the means of defense against denial of service attacks. First, some possible and common denial of service attacks are described to give the reader a basic understanding of what is this type of the attacks. The main part of the project is the mechanism, tools...

    Provided By Linkopings universitet

  • White Papers // May 2009

    Firewall Implementation and Testing

    Almost every machine on the internet today is protected by a firewall. Many of them are misconfigured which is seldom discovered due to poor testing. This paper summarizes the experiences in setting up and testing one's own firewall, as well as performing a penetration attack from an external machine to...

    Provided By Linkopings universitet

  • White Papers // Jul 2010

    Security Levels for Web Authentication using Mobile Phones

    Mobile phones offer unique advantages for secure authentication: they are small and portable, provide multiple data transfer channels, and are nearly ubiquitous. While phones provide a flexible and capable platform, phone designs vary, and the security level of an authentication solution is influenced by the choice of channels and authentication...

    Provided By Linkopings universitet