Skip to search formSkip to main contentSkip to account menu

Strong authentication

Known as: Strong Customer Authentication, Weak authentication 
Strong authentication is a notion with several unofficial definitions. However, since January 2013, it has been defined by regulation and incoming… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
We present a Wi-Fi hotspot authentication system that relies on a Near Field Communications (NFC) side-channel to address the… 
2010
2010
Technology has eroded the learning strategy from beneath the apple tree to learn any where at any time. The learners do not have… 
2010
2010
In this paper, we explore the relationship between ethnic group divisions and clientelism in competitive party systems. We find… 
2009
2009
In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently… 
2008
2008
This work proposes a new architecture, called Global Authentication Scheme for Mobile Ad-hoc Networks (GASMAN), for fully… 
2006
2006
The rapid increase of the phishing phenomenon states that the Web authentication systems not based on one time password (OTP) are… 
2006
2006
  • Marko Hassinen
  • 2006
  • Corpus ID: 17138041
Mobile commerce is a field with a huge potential for new applications. One of the most important aspects in such applications is… 
2005
2005
The theoretical literature on FDI and knowledge spillovers has predominantly focused on the firms’ choice between greenfield… 
2005
2005
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing… 
1990
1990
Let N be a homomorphically closed class of associative rings. Put N1 = Nl = N and, for ordinals a ≥ 2, define Nα (Nα) to be the…