Amanote Research

Amanote Research

    RegisterSign In

Applying Continuous Authentication to Protect Electronic Transactions

doi 10.4018/978-1-61350-507-6.ch005
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
Silas Leite AlbuquerquePaulo Roberto de Lira Gondim
Publisher

IGI Global


Related search

Application Layer Protocols to Protect Electronic Mail From Security Threads

2015English

Securing Electronic Medical Records Using Biometric Authentication

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

NIOSH Recommends Continuous Area Monitors to Protect Workers for Exposure to Harmful Vapors

Chemical and Engineering News
Chemical Engineering
1976English

Securing Electronic Transactions via Payment Gateways - A Systematic Review

International Journal of Internet Technology and Secured Transactions
Computer NetworksComputer Science ApplicationsCommunications
2017English

Continuous-Variable Quantum Authentication of Physical Unclonable Keys

Scientific Reports
Multidisciplinary
2017English

Approaches and Issues in Location-Aware Continuous Authentication

2010English

Using Counter Modes With Encapsulating Security Payload (ESP) and Authentication Header (AH) to Protect Group Traffic

2010English

Management Accounting of Electronic Transactions With the Use of Cryptocurrencies

Financial and credit activity: problems of theory and practice
2018English

Research of State of Modern Protection Technologies of Electronic Transactions

Technology audit and production reserves
2015English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy