The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Applying Continuous Authentication to Protect Electronic Transactions
Abstract
In this sense, this chapter explores some possibilities for continuous authentication use to increase electronic transactions security and addresses issues such: Trust in electronic communications systems, conventional authentication models, continuous authentication concepts and biometrics.
Related Content
Sarah Axtell, Tutaleni I. Asino.
© 2020.
16 pages.
|
Lazarus Ndiku Makewa.
© 2020.
19 pages.
|
Joseph Ezale Cobbinah.
© 2020.
19 pages.
|
Mbowa Henry Stanley, Kaaya Siraje Matovu.
© 2020.
32 pages.
|
Melih Derya Gürer.
© 2020.
26 pages.
|
Ezekiel Nyambega Omwenga.
© 2020.
10 pages.
|
Fernando Almeida.
© 2020.
26 pages.
|
|
|