Affiliation:
1. University of Brasilia, Brazil
Abstract
In this sense, this chapter explores some possibilities for continuous authentication use to increase electronic transactions security and addresses issues such: Trust in electronic communications systems, conventional authentication models, continuous authentication concepts and biometrics.
Reference39 articles.
1. Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., & Levkowetz, H. (Eds.). (2004). Extensible Authentication Protocol (EAP). RFC 3748, 2004.
2. Abrams, M. D. & Joyce M. V. (1995). Trusted System Concepts. Computers & Security, 14(1). Elsevier Advanced Technology.
3. Albuquerque, S. L., Gondim, P. R. L., & Monteiro, C. C. (2010). Aspectos de Segurança na Interconexão de Redes Celulares e WLANs. Paper presented at 10th Brazilian Security Symposium (SBSeg2010).
4. Alireza Pourshahid, A., & Tran, T. (2007). Modeling Trust in E-Commerce: An Approach Based on User Requirements. Paper presented at IEEE International Conference on Electronic E-commerce (ICEC 2007).
5. Anand, R., Bajpai, G., Bhaskar, V. (2010). 3D Signature for Efficient Authentication in Multimodal Biometric Security Systems. IACSIT International Journal of Engineering and Technology, 2 (2)