Strong authentication

Known as: Strong Customer Authentication, Weak authentication 
Strong authentication is a notion with several unofficial definitions. However, since January 2013, it has been defined by regulation and incoming… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1989-2017
0204019892017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
The telecare medicine information system enables or supports health-care delivery services. A secure authentication scheme will… (More)
  • table 1
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2010
2010
In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2009
2009
The protection of digital identities is getting more and more crucial. The usage of passwords for authentication is no longer… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the… (More)
  • table I
  • figure 1
  • table II
Is this relevant?
2008
2008
This paper describes thoroughly an authentication solution that is adequately strong, user-friendly and cost efficient. The idea… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2007
Highly Cited
2007
As low-cost RFIDs become more and more popular, it is imperative to design ultralightweight RFID authentication protocols to… (More)
  • figure 1
  • table 1
Is this relevant?
2007
2007
In a WWW environment, users need to come up with passwords for a lot of different services, e.g. in the area of e-commerce. These… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
Is this relevant?
2006
2006
The rapid increase of the phishing phenomenon states that the Web authentication systems not based on one time password (OTP) are… (More)
  • figure 1
  • figure 3
  • figure 2
  • table 1
Is this relevant?
2005
2005
It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports… (More)
  • figure 1
  • table 1
  • table 3
  • table 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?