Context-aware analysis for adaptive unified authentication platform
暂无分享,去创建一个
[1] Muhammad Sharif,et al. A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication , 2012 .
[2] Galoh Rashidah Haron,et al. Adaptive authentication based on analysis of user behavior , 2014, 2014 Science and Information Conference.
[3] Galoh Rashidah Haron,et al. Re-engineering of web reverse proxy with shibboleth authentication , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[4] Mario A. R. Dantas,et al. A2BeST: An adaptive authentication service based on mobile user's behavior and spatio-temporal context , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[5] Galoh Rashidah Haron,et al. Adaptive authentication: Issues and challenges , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[6] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.