Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets. Skracic, K., Pale, P., & Kostanjcar, Z. COMPUTERS & SECURITY, 67:107–121, June, 2017. doi bibtex @article{WOS:000401213200007,
author = {Skracic, Kristian and Pale, Predrag and Kostanjcar, Zvonko},
doi = {10.1016/j.cose.2017.03.002},
issn = {0167-4048},
journal = {COMPUTERS \& SECURITY},
month = jun,
pages = {107--121},
title = {{Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets}},
volume = {67},
year = {2017}
}
Downloads: 0
{"_id":"428TrTi87AWCTQFxs","bibbaseid":"skracic-pale-kostanjcar-authenticationapproachusingonetimechallengegenerationbasedonuserbehaviorpatternscapturedintransactionaldatasets-2017","author_short":["Skracic, K.","Pale, P.","Kostanjcar, Z."],"bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Skracic"],"firstnames":["Kristian"],"suffixes":[]},{"propositions":[],"lastnames":["Pale"],"firstnames":["Predrag"],"suffixes":[]},{"propositions":[],"lastnames":["Kostanjcar"],"firstnames":["Zvonko"],"suffixes":[]}],"doi":"10.1016/j.cose.2017.03.002","issn":"0167-4048","journal":"COMPUTERS & SECURITY","month":"June","pages":"107–121","title":"Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets","volume":"67","year":"2017","bibtex":"@article{WOS:000401213200007,\nauthor = {Skracic, Kristian and Pale, Predrag and Kostanjcar, Zvonko},\ndoi = {10.1016/j.cose.2017.03.002},\nissn = {0167-4048},\njournal = {COMPUTERS \\& SECURITY},\nmonth = jun,\npages = {107--121},\ntitle = {{Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets}},\nvolume = {67},\nyear = {2017}\n}\n","author_short":["Skracic, K.","Pale, P.","Kostanjcar, Z."],"key":"WOS:000401213200007","id":"WOS:000401213200007","bibbaseid":"skracic-pale-kostanjcar-authenticationapproachusingonetimechallengegenerationbasedonuserbehaviorpatternscapturedintransactionaldatasets-2017","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/f/rTKwnBhyGKSSptYtt/My Collection.bib","dataSources":["DY3AeP9t2QujfB78L","MpTxM7aR49zFotABd"],"keywords":[],"search_terms":["authentication","approach","using","one","time","challenge","generation","based","user","behavior","patterns","captured","transactional","data","sets","skracic","pale","kostanjcar"],"title":"Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets","year":2017}