Adaptive authentication: Issues and challenges

KAA Bakar, GR Haron - 2013 World Congress on Computer …, 2013 - ieeexplore.ieee.org
Authentication is a mechanism to establish proof of identities. Common practise for
authentication is to challenge user to present authentication credential. User who can …

Adaptive authentication based on analysis of user behavior

KAA Bakar, GR Haron - 2014 Science and Information …, 2014 - ieeexplore.ieee.org
Authentication is a mechanism to verify identity of users. Those who can present valid
credential are considered as authenticated identities. In this paper, we introduce an adaptive …

A survey on adaptive authentication using machine learning techniques

RM Pramila, M Misbahuddin, S Shukla - Data Science and Security …, 2022 - Springer
Adaptive authentication is a reliable technique to dynamically select the best mechanisms
among multiple modalities to authenticate a user based on the user's risk profile generated …

Authdna: An adaptive authentication service for any identity server

H De Silva, DC Wittebron, AMR Lahiru… - … on Advancements in …, 2019 - ieeexplore.ieee.org
Adaptive authentication refers to the way that configures two factors or multi-factor
authentication, based on the user's risk profile. One of the most pressing concerns in modern …

A survey of approaches to adaptive application security

A Elkhodary, J Whittle - International Workshop on Software …, 2007 - ieeexplore.ieee.org
Adaptive systems dynamically change their behavior or structure at runtime to respond to
environmental changes. This paper considers one class of adaptive systems-those that …

Engineering adaptive authentication

A Hassan, B Nuseibeh… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Adaptive authentication systems identify and enforce suitable methods to verify that
someone (user) or something (device) is eligible to access a service or a resource. An …

A framework for the delivery of personalized adaptive content

C Howlin, D Lynch - 2014 International Conference on Web and …, 2014 - ieeexplore.ieee.org
The number of students taking online courses has grown dramatically in recent years.
Increasingly institutions are turning to adaptive platforms to deliver these online courses as …

Secure and privacy-preserving biometrics based active authentication

Y Sui, X Zou, EY Du, F Li - 2012 IEEE International Conference …, 2012 - ieeexplore.ieee.org
User authentication is critical in preventing system breaches. Existing authentication
approaches usually do a onetime log-in authentication, but rarely incorporate mechanisms …

Performance improvements in schools with adaptive learning and assessment

R Raman, P Nedungadi - 2010 4th international conference on …, 2010 - ieeexplore.ieee.org
This paper presents Amrita Learning, a web-based, multimedia-enabled, Adaptive
Assessment and Learning System for schools. Computer-based adaptive assessments aim …

Design of a risk based authentication system using machine learning techniques

M Misbahuddin, BS Bindhumadhava… - … , Advanced & Trusted …, 2017 - ieeexplore.ieee.org
Authentication provides a means to verify the legitimacy of a user trying to access any
confidential or sensitive information. The need for protecting secure data hosted on the web …