Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Joseph Neil Johansen is active.

Publication


Featured researches published by Joseph Neil Johansen.


Archive | 2014

DETERMINING USER AUTHENTICATION REQUIREMENTS BASED ON THE CURRENT LOCATION OF THE USER IN COMPARISON TO THE USERS'S NORMAL BOUNDARY OF LOCATION

David M. Grigg; Peter John Bertanzetti; Charles Jason Burrell; Carrie Anne Hanson; Joseph Neil Johansen; Michael E. Toth


Archive | 2016

Self-selected user access based on specific authentication types

David M. Grigg; Joseph Neil Johansen; Carrie Anne Hanson; Charles Jason Burrell; Elizabeth S. Votaw


Archive | 2016

Sorting mobile banking functions into authentication buckets

David M. Grigg; Joseph Neil Johansen; Michael E. Toth; Daniel Lynn Carpenter; Hood Qaim-Maqami; Carrie Anne Hanson; Elizabeth S. Votaw


Archive | 2016

USER AUTHENTICATION BASED ON SELF-SELECTED PREFERENCES

David M. Grigg; Joseph Neil Johansen; Carrie Anne Hanson; Charles Jason Burrell; Elizabeth S. Votaw


Archive | 2014

DETERMINING USER AUTHENTICATION REQUIREMENTS BASED ON THE CURRENT LOCATION OF THE USER BEING WITHIN A PREDETERMINED AREA REQUIRING ALTERED AUTHENTICATION REQUIREMENTS

David M. Grigg; Peter John Bertanzetti; Charles Jason Burrell; Carrie Anne Hanson; Joseph Neil Johansen; Michael E. Toth


Archive | 2014

Determining user authentication requirements based on the current location of the user in comparison to a user's travel route

David M. Grigg; Peter John Bertanzetti; Charles Jason Burrell; Carrie Anne Hanson; Joseph Neil Johansen; Michael E. Toth


Archive | 2016

Shutting down access to all user accounts

David M. Grigg; Hood Qaim-Maqami; Alicia C. Jones; Elizabeth S. Votaw; Joseph Neil Johansen; Charles Jason Burrell; Carrie Anne Hanson; Michael Patrick Lynch


Archive | 2015

User authentication based on other applications

David M. Grigg; Peter John Bertanzetti; Charles Jason Burrell; Carrie Anne Hanson; Joseph Neil Johansen; Michael E. Toth; Elizabeth S. Votaw


Archive | 2014

Authentication level of function bucket based on circumstances

David M. Grigg; Joseph Neil Johansen; Michael E. Toth; Daniel Lynn Carpenter; Hood Qaim-Maqami; Carrie Anne Hanson; Elizabeth S. Votaw


Archive | 2014

Determining authentication requirements along a continuum based on a current state of the user and/or the service requiring authentication

David M. Grigg; Hood Qaim-Maqami; Joseph Neil Johansen

Collaboration


Dive into the Joseph Neil Johansen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge