Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,536,296 papers from all fields of science
Search
Sign In
Create Free Account
Knowledge-based authentication
Known as:
KBA
, Secret answer
, Secret question
Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Credit bureau
Identity Interrogation
Identity verification service
Outline of computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Mitochondrial gene marker sequences reveal identities of gobies at Minalungao National Park, Nueva Ecija, Philippines
Khristina G. Judan Cruz
,
M. N. Reyes
,
P. A. M. A. Maza
,
Revin Arsee P. Cardona
,
Wilson R. Jacinto
2018
Corpus ID: 212499467
Gobiidae is a rapidly growing family besides being the largest, with new species continuously discovered in all parts of the…
Expand
2017
2017
The chitinase activity of oil palm (Elaeis guineensis Jacq.) roots against fungal endophytes and pathogenic Ganoderma boninense
Yurnaliza
,
R. Esyanti
,
A. Susanto
,
I. Aryantha
2017
Corpus ID: 90848853
Application of fungal endophytes can be an alternative to control basal stem rot disease in oil palm, caused by 'Ganoderma…
Expand
2017
2017
Drive Trains, Fuels And Technologies For Heavy Duty Vehicles In 2030 And Beyond
A. Lischke
2017
Corpus ID: 59608610
The article analyses common technology trends for drivetrain-fuel combinations. Two scenarios up to year 2040 for the transport…
Expand
2013
2013
An assessment of Credit Rating as a Tool to Affordable Lending Among the sme's in Mombasa County
A. Mugendi
2013
Corpus ID: 168268835
The amendment of the banking Act (Cap) 488, Legal notice Number 97 has changed how financial institutions view SME's in Kenya…
Expand
2013
2013
A Pattern Matching Approach to Streaming Slot Filling
Hung Nguyen
,
Yi Fang
,
+5 authors
Miao Jiang
Text Retrieval Conference
2013
Corpus ID: 43307168
In this paper, we described our system for Knowledge Base Acceleration (KBA) Track at TREC 2013. The KBA Track has two tasks, CCR…
Expand
2012
2012
The HLTCOE Approach to the TREC 2012 KBA Track
Brian Kjersten
,
Paul McNamee
Text Retrieval Conference
2012
Corpus ID: 10347435
Our team submitted runs for the TREC KBA Cumulative Citation Recommendation task. This task involves labeling over 300 million…
Expand
2012
2012
GENERATION OF SECURE ONE -TIME PASSWORD BASED ON IMAGE AUTHENTICATION
Himika Parmar
,
Nancy Nainan
,
S. Thaseen
2012
Corpus ID: 6802255
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks…
Expand
2008
2008
Toetsnorm voor waterveiligheid op basis van kosten-batenanalyse
C.J.J. Eijgenraam
2008
Corpus ID: 190334296
Doel van de notitie is het formuleren van een algemeen toepasbare toetsnorm voor waterveiligheid op basis van kosten-batenanalyse…
Expand
1998
1998
KBA-D3: ein wissensbasiertes Diagnose- und Informationssystem für Druckmaschinen
Stefan K. Bamberger
,
Sabine Schwingeler
,
S. Ziegler
Künstliche Intell.
1998
Corpus ID: 7730633
1985
1985
Completion of Globally Finite Term Rewriting Systems for Inductive Proofs
R. Göbel
German Workshop on Artificial Intelligence
1985
Corpus ID: 38178037
The Knuth-Bendix Algorithm (KBA) is not able to complete term rewriting systems with cyclic rules such as the cornmutativity…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE