Skip to search formSkip to main contentSkip to account menu

Knowledge-based authentication

Known as: KBA, Secret answer, Secret question 
Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Gobiidae is a rapidly growing family besides being the largest, with new species continuously discovered in all parts of the… 
2017
2017
Application of fungal endophytes can be an alternative to control basal stem rot disease in oil palm, caused by 'Ganoderma… 
2017
2017
The article analyses common technology trends for drivetrain-fuel combinations. Two scenarios up to year 2040 for the transport… 
2013
2013
The amendment of the banking Act (Cap) 488, Legal notice Number 97 has changed how financial institutions view SME's in Kenya… 
2013
2013
In this paper, we described our system for Knowledge Base Acceleration (KBA) Track at TREC 2013. The KBA Track has two tasks, CCR… 
2012
2012
Our team submitted runs for the TREC KBA Cumulative Citation Recommendation task. This task involves labeling over 300 million… 
2012
2012
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks… 
2008
2008
Doel van de notitie is het formuleren van een algemeen toepasbare toetsnorm voor waterveiligheid op basis van kosten-batenanalyse… 
1985
1985
The Knuth-Bendix Algorithm (KBA) is not able to complete term rewriting systems with cyclic rules such as the cornmutativity…