Risk-based authentication

Results: 27



#Item
1Mobile Device Fingerprinting Considered Harmful for Risk-based Authentication Jan Spooren, Davy Preuveneers, Wouter Joosen iMinds-DistriNet Department of Computer Science, KU Leuven Leuven, Belgium

Mobile Device Fingerprinting Considered Harmful for Risk-based Authentication Jan Spooren, Davy Preuveneers, Wouter Joosen iMinds-DistriNet Department of Computer Science, KU Leuven Leuven, Belgium

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English - Date: 2015-07-31 14:34:27
    2DATA SHEET  CA Advanced Authentication At a Glance CA Advanced Authentication is a flexible and scalable solution that incorporates both risk-based authentication methods like device identification, geo-location and user

    DATA SHEET CA Advanced Authentication At a Glance CA Advanced Authentication is a flexible and scalable solution that incorporates both risk-based authentication methods like device identification, geo-location and user

    Add to Reading List

    Source URL: www.ca.com

    Language: English
      3Poster: Authentication by web browsing history Chisa Kuroda, Mizuki Kobayashi, Mioko Watanaze, and Manabu Okamoto Kanagawa Institute of Technology Shimo-ogino 1030, Atsugi-shi Kanagawa, Japan

      Poster: Authentication by web browsing history Chisa Kuroda, Mizuki Kobayashi, Mioko Watanaze, and Manabu Okamoto Kanagawa Institute of Technology Shimo-ogino 1030, Atsugi-shi Kanagawa, Japan

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:42:19
      4NovemberStronger Authentication for Small and Mid-Sized Business Small and Mid-Sized Businesses (SMBs) authenticate their end-users primarily with passwords, in spite of the fact that passwords are less secure,

      NovemberStronger Authentication for Small and Mid-Sized Business Small and Mid-Sized Businesses (SMBs) authenticate their end-users primarily with passwords, in spite of the fact that passwords are less secure,

      Add to Reading List

      Source URL: www.globalsecuritymag.com

      Language: English - Date: 2012-01-02 11:49:57
      5Effective and Painless Mult-Factor Authentication

      Effective and Painless Mult-Factor Authentication

      Add to Reading List

      Source URL: www.biometrie-online.net

      Language: English - Date: 2014-10-27 18:35:21
      6Risk Based Approach to Protecting Your Business
 11 April[removed]

      Risk Based Approach to Protecting Your Business 11 April[removed]

      Add to Reading List

      Source URL: www.infosec.gov.hk

      Language: English - Date: 2013-06-13 05:25:39
      7Risk Based Approach to Protecting Your Business
 11 April[removed]

      Risk Based Approach to Protecting Your Business 11 April[removed]

      Add to Reading List

      Source URL: www.infosec.gov.hk

      Language: English - Date: 2013-06-13 05:25:36
      8Risk Based Approach to Protecting Your Business
 11 April[removed]

      Risk Based Approach to Protecting Your Business 11 April[removed]

      Add to Reading List

      Source URL: www.infosec.gov.hk

      Language: English - Date: 2013-06-13 05:25:38
      9Risk Based Approach to Protecting Your Business
 11 April[removed]

      Risk Based Approach to Protecting Your Business 11 April[removed]

      Add to Reading List

      Source URL: www.infosec.gov.hk

      Language: English - Date: 2013-06-13 05:25:38
      1012_other_considerations_eng

      12_other_considerations_eng

      Add to Reading List

      Source URL: www.infosec.gov.hk

      Language: English - Date: 2013-01-28 04:23:20