Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,467,218 papers from all fields of science
Search
Sign In
Create Free Account
Security question
Known as:
Password hint
, Security questions
A security question is used as an authenticator by banks, cable companies and wireless providers as an extra security layer. They are a form of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
3-D Secure
Authentication
Internet
Keystroke logging
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Challenges for the Comprehensive and Integrated Information Security Management
J. Anttila
,
Kari Jussila
International Conference on Computational…
2017
Corpus ID: 36339171
Information security management needs to be considered from the perspective of individuals, organizations and the society as a…
Expand
Review
2014
Review
2014
Indoor Air Quality and Thermal Comfort Assessment of Two Portuguese Secondary Schools: Main Results
L. D. Pereira
,
Luís P. C. Neto
,
M. Silva
2014
Corpus ID: 73541230
The results of the field study about indoor thermal comfort in two of the involved schools of the 3Es project are presented. The…
Expand
2011
2011
Data Security through Confidentiality in Cloud Computing Environment
S. Mithila
,
P. P. Kumar
2011
Corpus ID: 16224049
-Cloud computing is an upcoming paradigm that offers tremendous advantages in economical aspects, such as reduced time to market…
Expand
2010
2010
Ascertaining the Relationship between Security Awareness and the Security Behavior of Individuals
Gordon Grant
2010
Corpus ID: 152373902
iii Acknowledgments iv List of Tables vii List of Figures viii
2007
2007
Design and Implementation of an Out-of-Band Virtualization System for Large SANs
Guangyan Zhang
,
J. Shu
,
Wei Xue
,
Weimin Zheng
IEEE transactions on computers
2007
Corpus ID: 25827249
Out-of-band virtualization intrinsically has the potential to provide high performance and good scalability. Unfortunately…
Expand
2007
2007
Agro-Biodiversity and Food Security: Biotechnology and Traditional Agricultural Practices at the Periphery of International Intellectual Property Regime Complex
Chidi Oguamanam
2007
Corpus ID: 166738395
According to regime theory, inequities in the Trade-Related Aspects of Intellectual Property Rights (TRIPS) Agreement has…
Expand
2006
2006
Private Security Contractors in Darfur: Reflecting and Reinforcing Neo-Liberal Governmentality
Anna Leander
,
Rens van Munster
2006
Corpus ID: 158045336
This article argues that the role of Private Security Contractors in Darfur reflects and reinforces neo-liberal governmentality…
Expand
Review
2006
Review
2006
The Economics of Information Security : A Survey and Open Questions
Ross J. Anderson
,
T. Moore
2006
Corpus ID: 6935270
The economics of information security has recently become a thriving and fastmoving discipline. As distributed systems are…
Expand
2005
2005
Computer Vulnerability Evaluation Using Fault Tree Analysis
T. Zhang
,
Mingzeng Hu
,
Xiao-chun Yun
,
Yongzheng Zhang
Information Security Practice and Experience
2005
Corpus ID: 2350012
For analyzing computer system security, the system visitor could be classified into five kinds by his privilege to access system…
Expand
2004
2004
Formal Security Analysis for Ad-Hoc Networks
Sebastian Nanz
,
C. Hankin
VODCA@FOSAD
2004
Corpus ID: 14188287
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE