Login / Signup
Addressing insider threat using "where you are" as fourth factor authentication.
Sung Choi
David Zage
Published in:
ICCST (2012)
Keyphrases
</>
insider threat
factor authentication
email
security architecture
data streams
databases
database
mobile terminals