Advances in user authentication D Dasgupta, A Roy, A Nag Springer International Publishing, 2017 | 104 | 2017 |
Toward the design of adaptive selection strategies for multi-factor authentication D Dasgupta, A Roy, A Nag Computers & Security 63, 85-116, 2016 | 104 | 2016 |
Multi-Factor Authentication: More secure approach towards authenticating individuals D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy, A Nag Advances in User Authentication, 185-233, 2017 | 91 | 2017 |
Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review MM Ahsan, KD Gupta, AK Nag, S Poudyal, AZ Kouzani, MAP Mahmud IEEE Access 8, 180799-180814, 2020 | 37 | 2020 |
Adaptive multi-factor authentication system D Dasgupta, AK Nag, A Roy US Patent 9,912,657, 2018 | 29 | 2018 |
Adaptive multi-factor authentication system D Dasgupta, AK Nag, A Roy US Patent 9,912,657, 2018 | 29 | 2018 |
An adaptive approach for active multi-factor authentication AK Nag, D Dasgupta, K Deb 9th annual symposium on information assurance (ASIA14) 39, 2014 | 28 | 2014 |
An adaptive approach for continuous multi-factor authentication in an identity eco-system AK Nag, D Dasgupta Proceedings of the 9th Annual Cyber and Information Security Research …, 2014 | 27 | 2014 |
An Adaptive Approach Towards the Selection of Authentication Factors in Multi-Factor Authentication (MFA) System AK Nag The University of Memphis, 2016 | 25* | 2016 |
An adaptive approach towards the selection of multi-factor authentication AK Nag, A Roy, D Dasgupta 2015 IEEE symposium series on computational intelligence, 463-472, 2015 | 25 | 2015 |
Human-Cognition-Based CAPTCHAs SK Saha, AK Nag, D Dasgupta IT Professional 17 (5), 42-48, 2015 | 16 | 2015 |
Negative Authentication Systems: Who am I?“I am not this; no, nor am I this, nor this,” then which remains is the identity of I D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy, A Nag Advances in User Authentication, 85-145, 2017 | 14 | 2017 |
Design and implementation of negative authentication system D Dasgupta, AK Nag, D Ferebee, SK Saha, KP Subedi, A Roy, A Madero, ... International Journal of Information Security 18, 23-48, 2019 | 10 | 2019 |
Biometric authentication D Dasgupta, A Roy, A Nag Advances in User Authentication, 37-84, 2017 | 10 | 2017 |
Authentication Basics: Key to the kingdom–Access a Computing System D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy, A Nag Advances in User Authentication, 1-36, 2017 | 8 | 2017 |
G-nas: A grid-based approach for negative authentication D Dasgupta, D Ferebee, S Saha, AK Nag, KP Subedi, A Madero, ... 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 1-10, 2014 | 8 | 2014 |
Adaptive multi-factor authentication system with multi-user permission strategy to access sensitive information D Dasgupta, A Roy, D Ghosh, AK Nag US Patent 11,038,896, 2021 | 5 | 2021 |
Continuous Authentication: Authenticating individuals frequently during sessions to assure valid identity D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy, A Nag Advances in User Authentication, 235-279, 2017 | 5 | 2017 |
A Deep-Defense Approach for Next-Gen Cyber-Resilient Inter-Dependent Critical Infrastructure Systems E Hammad, AK Nag, A Chennamaneni, M Aghashahi, E Dogdu 2021 Resilience Week (RWS), 1-7, 2021 | 4 | 2021 |
Biometric Authentication: Authentication through human characteristics D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy, A Nag Advances in User Authentication, 37-84, 2017 | 4 | 2017 |