Risk-based authentication

In Authentication, risk-based authentication is a non-static authentication system which takes into account the profile of the agent requesting… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2006-2018
012320062018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Due to the numerous data breaches, often resulting in the disclosure of a substantial amount of user passwords, the classic… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2016
2016
In recent years, an authentication method using humans' behavior is paid attention to such as risk-based authentication. A… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2016
2016
Cloud computing presents an innovative technique to deliver computing as a set of services that can be consumed and utilized over… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
2015
2015
In this paper, we present a critical assessment of the use of device fingerprinting for risk-based authentication in a state-of… (More)
  • figure 1
  • figure 2
  • table 2
  • table 1
  • table 3
Is this relevant?
2015
2015
An architecture for providing multi-factor authentication as a service is proposed, resting on the principle of a loose coupling… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2014
2014
The research presented in this paper develops a novel approach for a risk-based authentication system that takes into account… (More)
  • figure 3
  • figure 1
  • figure 2
  • figure 5
  • figure 6
Is this relevant?
2013
2013
In digital home networks, it is expected that independent smart devices communicate and cooperate with each other, without the… (More)
  • table 1
  • table 2
  • figure 1
  • table 3
  • figure 2
Is this relevant?
2013
2013
The degradation of the security of password-based mechanisms, combined with the increasing number of perils on the Internet, is… (More)
  • figure 1
  • figure 2
Is this relevant?
2013
2013
Authentication is a mechanism to establish proof of identities. Common practise for authentication is to challenge user to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Existing risk-based authentication systems rely on basic web communication information such as the source IP address or the… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?