Adaptive Authentication using User’s Uniqueness Quotient (original) (raw)

Risk-Adapted Access Control with Multimodal Biometric Identification

laszlo hanka

Interdisciplinary Description of Complex Systems, 2020

View PDFchevron_right

Amended Biometric Authentication using Secret Sharing

SONALI PATIL

International Journal of Computer Applications, 2014

View PDFchevron_right

Stronger authentication for password credential Internet Services

Todd Booth

2017 Third International Conference on Mobile and Secure Services (MobiSecServ), 2017

View PDFchevron_right

Enhanced Framework for Authentication as a Service to Ensure Security in Public Cloud Environment

S. Monikandan

International Journal of Engineering Research and, 2015

View PDFchevron_right

Intelligent Biometric System

Anupam Shukla

Journal of Information Technology Research, 2008

View PDFchevron_right

User Authentication using Native Language Passwords

Prof. M Shashi

International Journal of Network Security & Its Applications, 2011

View PDFchevron_right

A Novel Biometric Approach for Authentication In Pervasive Computing Environments

Dr. D. H. Rao

Advanced Computational Intelligence: An International Journal (ACII), 2016

View PDFchevron_right

Method of Authentication Table of Contents

ziv barzilay

2008

View PDFchevron_right

Non-obstructive Authentication in AAL Environments

luis lima

View PDFchevron_right

Specification and Enforcement of Dynamic Authorization Policies Oriented by Situations

Bashar Kabbani

2014 6th International Conference on New Technologies, Mobility and Security (NTMS), 2014

View PDFchevron_right

On Soft Biometrics

Paulo Correia

Pattern Recognition Letters, 2015

View PDFchevron_right

Unique Identification System

Alankrit Patnaik

International Journal of Computer Applications, 2010

View PDFchevron_right

HANDBOOK of APPLIED CRYPTOGRAPHY

Guilherme Morais

View PDFchevron_right

Trust-enhanced Security in Location-based Adaptive Authentication

Gabriele Lenzini

Electronic Notes in Theoretical Computer Science, 2008

View PDFchevron_right

On the design, implementation and application of an authorisation architecture for web services

Vijay Varadharajan

International Journal of Information and Computer Security, 2007

View PDFchevron_right

Using Closed Itemsets for Implicit User Authentication in Web Browsing

Olivier Raynaud

View PDFchevron_right

Establishing User Authentication using Face Geometry

GAUTAM Sanyal

International Journal of Computer Applications, 2014

View PDFchevron_right

Intelligent and Adaptive Systems

Ashok Patel

Handbook on Information Technologies for Education and Training, 2002

View PDFchevron_right

Authenticity

Andreas Fickers

Digital Roots, 2021

View PDFchevron_right

Authorisation Using Attributes from Multiple Authorities

David Chadwick

15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'06), 2006

View PDFchevron_right

Towards Privacy-Enhanced Authorization Policies and Languages

Ernesto Damiani

Lecture Notes in Computer Science, 2005

View PDFchevron_right

An advanced policy based authorisation infrastructure

Kaniz Fatema

Proceedings of the 5th ACM workshop on Digital identity management, 2009

View PDFchevron_right

Password-authenticated group key agreement with adaptive security and contributiveness

D. Catalano

2009

View PDFchevron_right

A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments

Robert Huijie

IEEE Transactions on Vehicular Technology, 2006

View PDFchevron_right

Relative-Identity Management Based on Context

Belkhir Abdelkader

Communications in Computer and Information Science, 2014

View PDFchevron_right