Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,064,656 papers from all fields of science
Search
Sign In
Create Free Account
Strong authentication
Known as:
Strong Customer Authentication
, Weak authentication
Strong authentication is a notion with several unofficial definitions. However, since January 2013, it has been defined by regulation and incoming…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
3-D Secure
Authentication
Credit card fraud
Debit card
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Secure hotspot authentication through a Near Field Communication side-channel
Alfredo Matos
,
Daniel Romao
,
Paulo Trezentos
IEEE International Conference on Wireless and…
2012
Corpus ID: 6253416
We present a Wi-Fi hotspot authentication system that relies on a Near Field Communications (NFC) side-channel to address the…
Expand
2010
2010
Web Service Based Secure E-Learning Management System- EWeMS
M. S. Basha
,
D. Ponnurangam
J. Convergence Inf. Technol.
2010
Corpus ID: 2537544
Technology has eroded the learning strategy from beneath the apple tree to learn any where at any time. The learners do not have…
Expand
2010
2010
Ethnic Group Divisions and Clientelism
Kiril Kolev
,
Yi-ting Wang
2010
Corpus ID: 56347665
In this paper, we explore the relationship between ethnic group divisions and clientelism in competitive party systems. We find…
Expand
2009
2009
On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
Aziz Mohaisen
,
Jeong Woon Choi
,
Dowon Hong
KSII Transactions on Internet and Information…
2009
Corpus ID: 13368496
In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently…
Expand
2008
2008
Self-organized authentication architecture for Mobile Ad-hoc Networks
P. Caballero-Gil
,
C. Caballero-Gil
,
J. Molina-Gil
,
C. Hernández-Goya
6th International Symposium on Modeling and…
2008
Corpus ID: 11739337
This work proposes a new architecture, called Global Authentication Scheme for Mobile Ad-hoc Networks (GASMAN), for fully…
Expand
2006
2006
A mobile based approach to strong authentication on Web
G. Me
,
Daniele Pirro
,
Roberto Sarrecchia
International Multi-Conference on Computing in…
2006
Corpus ID: 18657847
The rapid increase of the phishing phenomenon states that the Web authentication systems not based on one time password (OTP) are…
Expand
2006
2006
Java based Public Key Infrastructure for SMS Messaging
Marko Hassinen
2nd International Conference on Information…
2006
Corpus ID: 17138041
Mobile commerce is a field with a huge potential for new applications. One of the most important aspects in such applications is…
Expand
2005
2005
GREENFIELD INVESTMENT OR ACQUISITION? OPTIMAL FOREIGN ENTRY MODE WITH KNOWLEDGE SPILLOVERS IN A COURNOT GAME 1
L. Grünfeld
,
F. Sanna-Randaccio
2005
Corpus ID: 18795957
The theoretical literature on FDI and knowledge spillovers has predominantly focused on the firms’ choice between greenfield…
Expand
2005
2005
A practical implementation of transparent encryption and separation of duties in enterprise databases: protection against external and internal attacks on databases
Ulf T. Mattsson
IEEE Congress on Evolutionary Computation
2005
Corpus ID: 4664574
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing…
Expand
1990
1990
Kurosh's chains of associative rings
R. Andruszkiewicz
,
E. Puczyłowski
Glasgow Mathematical Journal
1990
Corpus ID: 12773857
Let N be a homomorphically closed class of associative rings. Put N1 = Nl = N and, for ordinals a ≥ 2, define Nα (Nα) to be the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE