Skip to search formSkip to main contentSkip to account menu

Strong authentication

Known as: Strong Customer Authentication, Weak authentication 
Strong authentication is a notion with several unofficial definitions. However, since January 2013, it has been defined by regulation and incoming… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
In this paper we study the distribution of average user rating of entities in three different domains: restaurants, movies… 
Review
2012
Review
2012
Two-factor authentication delivers authentication through devices the customers have and the information (PIN) they already known… 
2010
2010
Technology has eroded the learning strategy from beneath the apple tree to learn any where at any time. The learners do not have… 
2009
2009
Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further… 
2008
2008
This work proposes a new architecture, called Global Authentication Scheme for Mobile Ad-hoc Networks (GASMAN), for fully… 
2006
2006
The rapid increase of the phishing phenomenon states that the Web authentication systems not based on one time password (OTP) are… 
2005
2005
The theoretical literature on FDI and knowledge spillovers has predominantly focused on the firms’ choice between greenfield… 
1990
1990
Let N be a homomorphically closed class of associative rings. Put N1 = Nl = N and, for ordinals a ≥ 2, define Nα (Nα) to be the…