Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,307 papers from all fields of science
Search
Sign In
Create Free Account
Multi-factor authentication
Known as:
2 step verification
, Two factor
, Soft token
Expand
Multi-factor authentication (MFA) is a method of computer access control in which a user is only granted access after successfully presenting several…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
42 relations
Access control
Authentication
Authentication server
Bastion host
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
Goutham Reddy Alavalapati
,
A. Das
,
Eunjun Yoon
,
K. Yoo
IEEE Access
2016
Corpus ID: 29656319
Mobile user authentication is an essential topic to consider in the current communications technology due to greater deployment…
Expand
2009
2009
Trade, Offshoring, and the Invisible Handshake
B. Karabay
,
J. McLaren
2009
Corpus ID: 14183955
Highly Cited
2003
Highly Cited
2003
Natural Occurrence and Distribution of Fusarium Toxins in Contaminated Barley Cultivars
J. Perkowski
,
I. Kiecana
,
Z. Kaczmarek
European journal of plant pathology
2003
Corpus ID: 24993962
Grain samples of 15 naturally contaminated barley cultivars, collected after harvest in southeastern Poland, were analysed for…
Expand
2003
2003
Environmental, genetic and maternal components of immunocompetence of nestling pied flycatchers from a cross-fostering study
J. Soler
,
J. Moreno
,
J. Potti
2003
Corpus ID: 54876126
Genetic, environmental and maternal effects can all affect the phenotypic expression of a trait. Through cross-fostering…
Expand
2002
2002
Factor Structure of the Wechsler Intelligence Scale for Children–Third Edition among Gifted Students
Marley W. Watkins
,
Christopher Greenawalt
,
Catherine M. Marcell
2002
Corpus ID: 51830876
Factor analysis was applied to the Wechsler Intelligence Scale for Children–Third Edition (WISC-III) scores of 505 gifted…
Expand
2001
2001
SIMULATING BERMUDAN INTEREST RATE DERIVATIVES
P. Carr
,
Guang Yang
2001
Corpus ID: 156226156
AbstractWe use simulation to develop a Markov chain approximation for the value of caplets and Bermudan interest rate derivatives…
Expand
Highly Cited
2000
Highly Cited
2000
MEASURING THE EFFECTS OF POLLINATORS AND HERBIVORES: EVIDENCE FOR NON-ADDITIVITY IN A PERENNIAL HERB
C. Herrera
2000
Corpus ID: 44149267
Using an experimental approach, this study addresses the following two questions for the perennial herb Paeonia broteroi…
Expand
2000
2000
Why Long Term Forward Interest Rates (Almost) Always Slope Downwards
Roger H. Brown
,
S. Schaefer
2000
Corpus ID: 150498288
The paper documents a persistent and thus far largely overlooked empirical regularity in the yield curve: the tendency for the…
Expand
Highly Cited
1991
Highly Cited
1991
Height differences of low and high job status, female and male corporate employees
D. Egolf
,
L. Corder
1991
Corpus ID: 145223126
The heights of female and male corporate employees in management and nonmanagement positions were evaluated in two studies in…
Expand
Review
1978
Review
1978
The Evidence on Appropriate Factor Proportions for Manufacturing in Less Developed Countries: A Survey
L. White
Economic development and cultural change
1978
Corpus ID: 18288786
The question of appropriate factor proportions for less developed countries (LDCs) has emerged as an important area for research…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE