Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Karl Ackerman is active.

Publication


Featured researches published by Karl Ackerman.


Archive | 2012

Device presence validation

Lawrence N. Friedman; Karl Ackerman; Kenneth D. Ray; Yedidya Dotan


Archive | 2010

Defeating real-time trojan login attack with delayed interaction with fraudster

Robert Black; Karl Ackerman


Archive | 2013

Near field communication based authentication

Edward W. Vipond; Yong Qiao; Karl Ackerman; Marco Ciaffi; Daniel Wilder


Archive | 2013

Localized risk analytics for user authentication

Karl Ackerman; Edward W. Vipond; Daniel Wilder; Yong Qiao


Archive | 2012

Managing predictions in data security systems

Karl Ackerman; Yedidya Dotan; Lawrence N. Friedman


Archive | 2012

Knowledge based authentication using recent user internet activity

Karl Ackerman; Lawrence N. Friedman


Archive | 2012

Processorless token for producing a one-time password

Edward W. Vipond; Karl Ackerman


Archive | 2012

Brokering multiple authentications through a single proxy

Anton Khitrenovich; Oleg Freylafert; Yedidya Dotan; Lawrence N. Friedman; Karl Ackerman


Archive | 2012

Authentication using privacy protected personally identifiable information

Karl Ackerman


Archive | 2012

Data recovery service with automated identification and response to compromised user credentials

Abraham Zeev Rosen; Karl Ackerman; Daniel T. Cohen; Gali Kedar Ratson

Collaboration


Dive into the Karl Ackerman's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge