Skip to search formSkip to main contentSkip to account menu

Knowledge-based authentication

Known as: KBA, Secret answer, Secret question 
Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
This paper provides an overview of the work done at the Centrum Wiskunde & Informatica (CWI) and Delft University of Technology… 
2013
2013
Autonomous capabilities for manipulating randomly piled objects may enhance current methods of path planning and open a new field… 
2012
2012
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks… 
2012
2012
Our team submitted runs for the TREC KBA Cumulative Citation Recommendation task. This task involves labeling over 300 million… 
2012
2012
A description of the results for a Station Black-Out analysis for Atucha 2 Nuclear Power Plant is presented here. Calculations… 
Review
2009
Review
2009
With only five protected areas dedicated to the conservation of biodiversity (two national parks, one strict nature reserve and… 
2006
2006
As current knowledge-based systems do not take into account human limitations when recalling authenticating strings, individuals… 
2003
2003
This paper presents an authentication protocol for high-assurance smart card operating systems that support download of mutually… 
1993
1993
In an investigation of the subjective categorization of pelt traits in Karakul lambs it was demonstrated that the common practice…