Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets. Skračić, K., Pale, P., & Kostanjčar, Z. Computers & Security, 3, 2017. Website bibtex @article{
title = {Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets},
type = {article},
year = {2017},
identifiers = {[object Object]},
keywords = {authentication},
websites = {http://dx.doi.org/10.1016/j.cose.2017.03.002},
month = {3},
id = {2d5c0e02-67a5-336e-9dac-e5d9a8589d2f},
created = {2018-07-12T21:31:43.078Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:31:43.078Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {skarcic:authentication2017},
source_type = {article},
private_publication = {false},
bibtype = {article},
author = {Skračić, Kristian and Pale, Predrag and Kostanjčar, Zvonko},
journal = {Computers & Security}
}
Downloads: 0
{"_id":"Ym9zdwRmmzuyEkAmy","bibbaseid":"skrai-pale-kostanjar-authenticationapproachusingonetimechallengegenerationbasedonuserbehaviorpatternscapturedintransactionaldatasets-2017","downloads":0,"creationDate":"2019-02-15T15:14:59.722Z","title":"Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets","author_short":["Skračić, K.","Pale, P.","Kostanjčar, Z."],"year":2017,"bibtype":"article","biburl":null,"bibdata":{"title":"Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets","type":"article","year":"2017","identifiers":"[object Object]","keywords":"authentication","websites":"http://dx.doi.org/10.1016/j.cose.2017.03.002","month":"3","id":"2d5c0e02-67a5-336e-9dac-e5d9a8589d2f","created":"2018-07-12T21:31:43.078Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:31:43.078Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"skarcic:authentication2017","source_type":"article","private_publication":false,"bibtype":"article","author":"Skračić, Kristian and Pale, Predrag and Kostanjčar, Zvonko","journal":"Computers & Security","bibtex":"@article{\n title = {Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets},\n type = {article},\n year = {2017},\n identifiers = {[object Object]},\n keywords = {authentication},\n websites = {http://dx.doi.org/10.1016/j.cose.2017.03.002},\n month = {3},\n id = {2d5c0e02-67a5-336e-9dac-e5d9a8589d2f},\n created = {2018-07-12T21:31:43.078Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:31:43.078Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {skarcic:authentication2017},\n source_type = {article},\n private_publication = {false},\n bibtype = {article},\n author = {Skračić, Kristian and Pale, Predrag and Kostanjčar, Zvonko},\n journal = {Computers & Security}\n}","author_short":["Skračić, K.","Pale, P.","Kostanjčar, Z."],"urls":{"Website":"http://dx.doi.org/10.1016/j.cose.2017.03.002"},"bibbaseid":"skrai-pale-kostanjar-authenticationapproachusingonetimechallengegenerationbasedonuserbehaviorpatternscapturedintransactionaldatasets-2017","role":"author","keyword":["authentication"],"downloads":0},"search_terms":["authentication","approach","using","one","time","challenge","generation","based","user","behavior","patterns","captured","transactional","data","sets","skračić","pale","kostanjčar"],"keywords":["authentication"],"authorIDs":[]}