Risk-based authentication

Results: 27



#Item
1

Mobile Device Fingerprinting Considered Harmful for Risk-based Authentication Jan Spooren, Davy Preuveneers, Wouter Joosen iMinds-DistriNet Department of Computer Science, KU Leuven Leuven, Belgium

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English - Date: 2015-07-31 14:34:27
    2

    DATA SHEET CA Advanced Authentication At a Glance CA Advanced Authentication is a flexible and scalable solution that incorporates both risk-based authentication methods like device identification, geo-location and user

    Add to Reading List

    Source URL: www.ca.com

    Language: English
      3Access control / Authentication / Notary / Packaging / Password / OpenID / Risk-based authentication / Shibboleth / Athens / Security / Cryptography / Federated identity

      Poster: Authentication by web browsing history Chisa Kuroda, Mizuki Kobayashi, Mioko Watanaze, and Manabu Okamoto Kanagawa Institute of Technology Shimo-ogino 1030, Atsugi-shi Kanagawa, Japan

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:42:19
      4Two-factor authentication / One-time password / Password / Single sign-on / Multi-factor authentication / Risk-based authentication / Identity management / Security token / Password manager / Security / Access control / Computer security

      NovemberStronger Authentication for Small and Mid-Sized Business Small and Mid-Sized Businesses (SMBs) authenticate their end-users primarily with passwords, in spite of the fact that passwords are less secure,

      Add to Reading List

      Source URL: www.globalsecuritymag.com

      Language: English - Date: 2012-01-02 11:49:57
      5Access control / Computer network security / Authentication / Notary / Packaging / Security token / Multi-factor authentication / Password / Risk-based authentication / Security / Cryptography / Computer security

      Effective and Painless Mult-Factor Authentication

      Add to Reading List

      Source URL: www.biometrie-online.net

      Language: English - Date: 2014-10-27 18:35:21
      6Smart card / Two-factor authentication / Authentication / Security / ISO standards / Ubiquitous computing

      Risk Based Approach to Protecting Your Business 11 April[removed]

      Add to Reading List

      Source URL: www.infosec.gov.hk

      Language: English - Date: 2013-06-13 05:25:39
      7Smart card / Two-factor authentication / Authentication / Security / ISO standards / Ubiquitous computing

      Risk Based Approach to Protecting Your Business 11 April[removed]

      Add to Reading List

      Source URL: www.infosec.gov.hk

      Language: English - Date: 2013-06-13 05:25:36
      8Smart card / Two-factor authentication / Authentication / Security / ISO standards / Ubiquitous computing

      Risk Based Approach to Protecting Your Business 11 April[removed]

      Add to Reading List

      Source URL: www.infosec.gov.hk

      Language: English - Date: 2013-06-13 05:25:38
      9Smart card / Two-factor authentication / Authentication / Security / ISO standards / Ubiquitous computing

      Risk Based Approach to Protecting Your Business 11 April[removed]

      Add to Reading List

      Source URL: www.infosec.gov.hk

      Language: English - Date: 2013-06-13 05:25:38
      10Two-factor authentication / Password / Phishing / Authentication / User / Risk-based authentication / Security token / Security / Cryptography / Access control

      12_other_considerations_eng

      Add to Reading List

      Source URL: www.infosec.gov.hk

      Language: English - Date: 2013-01-28 04:23:20
      UPDATE