Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,682,111 papers from all fields of science
Search
Sign In
Create Free Account
Knowledge-based authentication
Known as:
KBA
, Secret answer
, Secret question
Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Credit bureau
Identity Interrogation
Identity verification service
Outline of computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
CWI and TU Delft Notebook TREC 2013: Contextual Suggestion, Federated Web Search, KBA, and Web Tracks
Alejandro Bellogín
,
Gebrekirstos G. Gebremeskel
,
+5 authors
Jeroen B. P. Vuurens
Text Retrieval Conference
2013
Corpus ID: 204089019
This paper provides an overview of the work done at the Centrum Wiskunde & Informatica (CWI) and Delft University of Technology…
Expand
2013
2013
Toward autonomous disassembling of randomly piled objects with minimal perturbation
Oni Ornan
,
Amir Degani
IEEE/RSJ International Conference on Intelligent…
2013
Corpus ID: 17250600
Autonomous capabilities for manipulating randomly piled objects may enhance current methods of path planning and open a new field…
Expand
2012
2012
GENERATION OF SECURE ONE -TIME PASSWORD BASED ON IMAGE AUTHENTICATION
Himika Parmar
,
Nancy Nainan
,
S. Thaseen
2012
Corpus ID: 6802255
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks…
Expand
2012
2012
The HLTCOE Approach to the TREC 2012 KBA Track
Brian Kjersten
,
Paul McNamee
Text Retrieval Conference
2012
Corpus ID: 10347435
Our team submitted runs for the TREC KBA Cumulative Citation Recommendation task. This task involves labeling over 300 million…
Expand
2012
2012
Station Black-Out Analysis with MELCOR 1.8.6 Code for Atucha 2Nuclear Power Plant
A. Bonelli
,
O. Mazzantini
,
+4 authors
M. Giménez
2012
Corpus ID: 55430530
A description of the results for a Station Black-Out analysis for Atucha 2 Nuclear Power Plant is presented here. Calculations…
Expand
Review
2009
Review
2009
Review of the protected area network in Guinea, West Africa, and recommendations for new sites for biodiversity conservation
D. Brugière
,
Rebecca Kormos
Biodiversity and Conservation
2009
Corpus ID: 35261867
With only five protected areas dedicated to the conservation of biodiversity (two national parks, one strict nature reserve and…
Expand
2006
2006
Authentication Using Tactile Feedback
Ravi Kuber
,
Wai Yu
2006
Corpus ID: 5512133
As current knowledge-based systems do not take into account human limitations when recalling authenticating strings, individuals…
Expand
2003
2003
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
H. Scherzer
,
R. Canetti
,
P. Karger
,
H. Krawczyk
,
T. Rabin
,
David C. Toll
European Symposium on Research in Computer…
2003
Corpus ID: 398156
This paper presents an authentication protocol for high-assurance smart card operating systems that support download of mutually…
Expand
2000
2000
The laboratory medium used to grow biocontrol Pseudomonas sp. Pf153 influences its subsequent ability to protect cucumber from black root rot
J. Fuchs
,
Y. Moënne‐Loccoz
,
G. Défago
2000
Corpus ID: 34976944
1993
1993
An evaluation of the subjective categorization of hair quality pelt traits in Karakul lambs
S. Schoeman
,
J. R. Albertyn
1993
Corpus ID: 55946875
In an investigation of the subjective categorization of pelt traits in Karakul lambs it was demonstrated that the common practice…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE