Author of the publication

A maximum entropy approach to feature selection in knowledge-based authentication.

, and . Decis. Support Syst., 46 (1): 388-398 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Liginlal, Divakaran
add a person with the name Liginlal, Divakaran
 

Other publications of authors with the same name

Wish Lists and Shopping Carts: A Study of Visual Metaphors on Arab E-Commerce Websites., , , and . WEB, volume 258 of Lecture Notes in Business Information Processing, page 176-180. Springer, (2015)An Empirical Investigation of Knowledge-Based Authentication., and . AMCIS, page 265. Association for Information Systems, (2007)How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management, , and . Computers & Security, (2009)Web Accessibility as a Barrier to Successful Digital Governance: A Case Study of the Arabian Gulf Region., and . CONF-IRM, page 42. (2017)Whither information security? Examining the complementarities and substitutive effects among IT and information security firms., and . Int. J. Inf. Manag., 32 (3): 271-281 (2012)The Influence of Regulations on Innovation in Information Security., and . AMCIS, page 180. Association for Information Systems, (2007)Using Real Options Theory to Evaluate Strategic Investment Options for Mobile Content Delivery: A Case Study., , and . Int. J. Bus. Data Commun. Netw., 6 (1): 17-37 (2010)A Study of Natural Interactions with Digital Heritage Artifacts., and . DigitalHERITAGE/VSMM, page 1-4. IEEE, (2018)A maximum entropy approach to feature selection in knowledge-based authentication., and . Decis. Support Syst., 46 (1): 388-398 (2008)Has Decreasing Innovation Hurt the Stock Price of Information Security Firms? A Time Series Analysis., and . AMCIS, page 784. Association for Information Systems, (2009)