Amanote Research
Register
Sign In
Applying Continuous Authentication to Protect Electronic Transactions
doi 10.4018/978-1-61350-507-6.ch005
Full Text
Open PDF
Abstract
Available in
full text
Date
Unknown
Authors
Silas Leite Albuquerque
Paulo Roberto de Lira Gondim
Publisher
IGI Global
Related search
Application Layer Protocols to Protect Electronic Mail From Security Threads
Securing Electronic Medical Records Using Biometric Authentication
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
NIOSH Recommends Continuous Area Monitors to Protect Workers for Exposure to Harmful Vapors
Chemical and Engineering News
Chemical Engineering
Securing Electronic Transactions via Payment Gateways - A Systematic Review
International Journal of Internet Technology and Secured Transactions
Computer Networks
Computer Science Applications
Communications
Continuous-Variable Quantum Authentication of Physical Unclonable Keys
Scientific Reports
Multidisciplinary
Approaches and Issues in Location-Aware Continuous Authentication
Using Counter Modes With Encapsulating Security Payload (ESP) and Authentication Header (AH) to Protect Group Traffic
Management Accounting of Electronic Transactions With the Use of Cryptocurrencies
Financial and credit activity: problems of theory and practice
Research of State of Modern Protection Technologies of Electronic Transactions
Technology audit and production reserves