1![Mobile Device Fingerprinting Considered Harmful for Risk-based Authentication Jan Spooren, Davy Preuveneers, Wouter Joosen iMinds-DistriNet Department of Computer Science, KU Leuven Leuven, Belgium Mobile Device Fingerprinting Considered Harmful for Risk-based Authentication Jan Spooren, Davy Preuveneers, Wouter Joosen iMinds-DistriNet Department of Computer Science, KU Leuven Leuven, Belgium](https://www.pdfsearch.io/img/c6387af6e9d2ea2cedaaaf5f63074cf2.jpg) | Add to Reading ListSource URL: lirias.kuleuven.beLanguage: English - Date: 2015-07-31 14:34:27
|
---|
2![DATA SHEET CA Advanced Authentication At a Glance CA Advanced Authentication is a flexible and scalable solution that incorporates both risk-based authentication methods like device identification, geo-location and user DATA SHEET CA Advanced Authentication At a Glance CA Advanced Authentication is a flexible and scalable solution that incorporates both risk-based authentication methods like device identification, geo-location and user](https://www.pdfsearch.io/img/39c4d8058bee9a16b12221afe778c944.jpg) | Add to Reading ListSource URL: www.ca.comLanguage: English |
---|
3![Poster: Authentication by web browsing history Chisa Kuroda, Mizuki Kobayashi, Mioko Watanaze, and Manabu Okamoto Kanagawa Institute of Technology Shimo-ogino 1030, Atsugi-shi Kanagawa, Japan Poster: Authentication by web browsing history Chisa Kuroda, Mizuki Kobayashi, Mioko Watanaze, and Manabu Okamoto Kanagawa Institute of Technology Shimo-ogino 1030, Atsugi-shi Kanagawa, Japan](https://www.pdfsearch.io/img/4b63bee751abdd58f1a92af4054d08d1.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2015-05-11 16:42:19
|
---|
4![NovemberStronger Authentication for Small and Mid-Sized Business Small and Mid-Sized Businesses (SMBs) authenticate their end-users primarily with passwords, in spite of the fact that passwords are less secure, NovemberStronger Authentication for Small and Mid-Sized Business Small and Mid-Sized Businesses (SMBs) authenticate their end-users primarily with passwords, in spite of the fact that passwords are less secure,](https://www.pdfsearch.io/img/6188e9cf5f73eaa1a5e17399068c94ad.jpg) | Add to Reading ListSource URL: www.globalsecuritymag.comLanguage: English - Date: 2012-01-02 11:49:57
|
---|
5![Effective and Painless Mult-Factor Authentication Effective and Painless Mult-Factor Authentication](https://www.pdfsearch.io/img/fc6d32b326f60bc2e6395c968feb064f.jpg) | Add to Reading ListSource URL: www.biometrie-online.netLanguage: English - Date: 2014-10-27 18:35:21
|
---|
6![Risk Based Approach to Protecting Your Business
11 April[removed] Risk Based Approach to Protecting Your Business
11 April[removed]](https://www.pdfsearch.io/img/4b37f4a36f2cc554138f3b59b473ffc3.jpg) | Add to Reading ListSource URL: www.infosec.gov.hkLanguage: English - Date: 2013-06-13 05:25:39
|
---|
7![Risk Based Approach to Protecting Your Business
11 April[removed] Risk Based Approach to Protecting Your Business
11 April[removed]](https://www.pdfsearch.io/img/cf851829ee7d14156794b57a6b7e44ce.jpg) | Add to Reading ListSource URL: www.infosec.gov.hkLanguage: English - Date: 2013-06-13 05:25:36
|
---|
8![Risk Based Approach to Protecting Your Business
11 April[removed] Risk Based Approach to Protecting Your Business
11 April[removed]](https://www.pdfsearch.io/img/e7caf7058deca72a784df392d3150250.jpg) | Add to Reading ListSource URL: www.infosec.gov.hkLanguage: English - Date: 2013-06-13 05:25:38
|
---|
9![Risk Based Approach to Protecting Your Business
11 April[removed] Risk Based Approach to Protecting Your Business
11 April[removed]](https://www.pdfsearch.io/img/d13cea13b23dad1afdfa42ab91a19126.jpg) | Add to Reading ListSource URL: www.infosec.gov.hkLanguage: English - Date: 2013-06-13 05:25:38
|
---|
10![12_other_considerations_eng 12_other_considerations_eng](https://www.pdfsearch.io/img/c426360c86a0bb9d0beafc12ca5d7870.jpg) | Add to Reading ListSource URL: www.infosec.gov.hkLanguage: English - Date: 2013-01-28 04:23:20
|
---|