IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Applying Continuous Authentication to Protect Electronic Transactions

Applying Continuous Authentication to Protect Electronic Transactions
View Sample PDF
Author(s): Silas Leite Albuquerque (University of Brasilia, Brazil)and Paulo Roberto de Lira Gondim (University of Brasilia, Brazil)
Copyright: 2012
Pages: 28
Source title: Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances
Source Author(s)/Editor(s): Te-Shun Chou (East Carolina University, USA)
DOI: 10.4018/978-1-61350-507-6.ch005

Purchase

View Applying Continuous Authentication to Protect Electronic Transactions on the publisher's website for pricing and purchasing information.

Abstract

In this sense, this chapter explores some possibilities for continuous authentication use to increase electronic transactions security and addresses issues such: Trust in electronic communications systems, conventional authentication models, continuous authentication concepts and biometrics.

Related Content

Chirag Sharma, Amanpreet Kaur, Priyanka Datta, Yonis Gulzar. © 2025. 30 pages.
M. Johnpaul, Raam Sai Bharadwaj Miryala, Marica Mazurek, G. Jayaprakashnarayana, Ramesh Kumar Miryala. © 2025. 28 pages.
Jatin Arora, Gaganpreet Kaur, Monika Sethi, Saravjeet Singh. © 2025. 20 pages.
L. A. Anto Gracious, L. Sudha, B. Chitra, Gaganpreet Kaur, V. Sathya, P. Kabitha, R. Siva Subramanian. © 2025. 28 pages.
Bhavik Singla, Anuj Kumar Jain, Gaganpreet Kaur, Nitin Jain, Vishal Jain. © 2025. 28 pages.
P. Vijayalakshmi, K. Subashini, B. Selvalakshmi, G. Sudhakar, Anand Anbalagan, N. Bharathiraja, Gaganpreet Kaur. © 2025. 22 pages.
Djamel Saba, Abdelkader Hadidi. © 2025. 28 pages.
Body Bottom