Fourth-factor authentication
- 30 October 2006
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 168-178
- https://doi.org/10.1145/1180405.1180427
Abstract
No abstract availableKeywords
This publication has 6 references indexed in Scilit:
- Seeing-Is-Believing: Using Camera Phones for Human-Verifiable AuthenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Messin’ with Texas Deriving Mother’s Maiden Names Using Public RecordsLecture Notes in Computer Science, 2005
- Seeing-Is-Believing: Using Camera Phones for Human-Verifiable AuthenticationPublished by Defense Technical Information Center (DTIC) ,2004
- SPKI Requirements1999
- KeyNote: Trust Management for Public-Key InfrastructuresLecture Notes in Computer Science, 1998
- Compliance checking in the PolicyMaker trust management systemPublished by Springer Science and Business Media LLC ,1998