Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,627,326 papers from all fields of science
Search
Sign In
Create Free Account
Strong authentication
Known as:
Strong Customer Authentication
, Weak authentication
Strong authentication is a notion with several unofficial definitions. However, since January 2013, it has been defined by regulation and incoming…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
3-D Secure
Authentication
Credit card fraud
Debit card
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Para 'Normal' Activity: On the Distribution of Average Ratings
Nilesh N. Dalvi
,
Ravi Kumar
,
Bo Pang
International Conference on Web and Social Media
2013
Corpus ID: 15824254
In this paper we study the distribution of average user rating of entities in three different domains: restaurants, movies…
Expand
Review
2012
Review
2012
EVALUATING THE PERFORMANCE OF TWO-FACTOR AUTHENTICATION SOLUTION IN THE BANKING SECTOR
Olufemi Sunday
,
Adeoye
2012
Corpus ID: 6836296
Two-factor authentication delivers authentication through devices the customers have and the information (PIN) they already known…
Expand
2010
2010
Web Service Based Secure E-Learning Management System- EWeMS
M. S. Basha
,
D. Ponnurangam
J. Convergence Inf. Technol.
2010
Corpus ID: 2537544
Technology has eroded the learning strategy from beneath the apple tree to learn any where at any time. The learners do not have…
Expand
2009
2009
A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks
Yannis Stelios
,
Nikos Papayanoulas
,
P. Trakadas
,
S. Maniatis
,
H. Leligou
,
T. Zahariadis
Mobile Lightweight Wireless Systems
2009
Corpus ID: 18915264
Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further…
Expand
2008
2008
Self-organized authentication architecture for Mobile Ad-hoc Networks
P. Caballero-Gil
,
C. Caballero-Gil
,
J. Molina-Gil
,
C. Hernández-Goya
6th International Symposium on Modeling and…
2008
Corpus ID: 11739337
This work proposes a new architecture, called Global Authentication Scheme for Mobile Ad-hoc Networks (GASMAN), for fully…
Expand
2006
2006
A mobile based approach to strong authentication on Web
G. Me
,
Daniele Pirro
,
Roberto Sarrecchia
International Multi-Conference on Computing in…
2006
Corpus ID: 18657847
The rapid increase of the phishing phenomenon states that the Web authentication systems not based on one time password (OTP) are…
Expand
2005
2005
GREENFIELD INVESTMENT OR ACQUISITION? OPTIMAL FOREIGN ENTRY MODE WITH KNOWLEDGE SPILLOVERS IN A COURNOT GAME 1
L. Grünfeld
,
F. Sanna-Randaccio
2005
Corpus ID: 18795957
The theoretical literature on FDI and knowledge spillovers has predominantly focused on the firms’ choice between greenfield…
Expand
2003
2003
Security for XML messaging services - a component-based approach
K. Komathy
,
V. Ramachandran
,
P. Vivekanandan
Journal of Network and Computer Applications
2003
Corpus ID: 30578431
2002
2002
Biometric Authentication for Mobile Devices
N. Clarke
,
S. Furnell
,
P. Reynolds
2002
Corpus ID: 17881218
__
1990
1990
Kurosh's chains of associative rings
R. Andruszkiewicz
,
E. Puczyłowski
Glasgow Mathematical Journal
1990
Corpus ID: 12773857
Let N be a homomorphically closed class of associative rings. Put N1 = Nl = N and, for ordinals a ≥ 2, define Nα (Nα) to be the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE