Personal Choice and Challenge Questions: A Security and Usability Assessment (2009)


Download Links

by Mike Just
Venue:In SOUPS ’09: Proceedings of the Fifth Symposium on Usable Privacy and Security
Citations:13 - 1 self

Active Bibliography

4 What’s in a name? evaluating statistical attacks on personal knowledge questions – Joseph Bonneau, Mike Just, Greg Matthews - 2010
5 Quantifying the Security of Preference-based Authentication – Markus Jakobsson, Liu Yang, Susanne Wetzel
Web Authentication Schemes [FULL LENGTH TECHNICAL REPORT] – Joseph Bonneau, Cormac Herley, Paul C. Van Oorschot, Frank Stajano, Cambridge Cb Fd, Paul C. Van Oorschot, Frank Stajano, Joseph Bonneau, Cormac Herley, Paul C. Van Oorschot, Frank Stajano - 2012
Knowledge-Based Authentication: Evaluating and Improving Case for Support – Description of Proposed Research and its Context – David Aspinall, Michael Just
35 Personal knowledge questions for fallback authentication: security questions in the era of Facebook – Ariel Rabkin - 2008
unknown title – unknown authors
Alice and Bob’s life stories Cryptographic communication using shared experiences – Joseph Bonneau
1 Mercury: Recovering Forgotten Passwords Using Personal Devices ⋆ – Mohammad Mannan, David Barrera, Carson Brown, David Lie, Paul C. Van Oorschot
25 It’s No Secret. Measuring the Security and Reliability of Authentication via Secret Questions – Stuart Schechter, A. J. Bernheim Brush, Serge Egelman - 2009
17 The Password Thicket: technical and market failures in human authentication on the web – Joseph Bonneau, Sören Preibusch - 2010
1 Alice and Bob in Love: Cryptographic Communication Using Natural Entropy (draft version) – Joseph Bonneau - 2009
4 Digital Objects as Passwords ∗ – Mohammad Mannan, P. C. Van Oorschot
Evaluating the Use of Autobiographical Memory for Authentication – Sauvik Das, Eiji Hayashi, Jason I. Hong, Ian Oakley
ABSTRACT Title of dissertation: SHARING PRIVATE DATA OVER PUBLIC NETWORKS – unknown authors - 2012
8 It’s not what you know, but who you know: A social approach to last-resort authentication – Stuart Schechter, Serge Egelman, Robert W. Reeder - 2009
7 Correct horse battery staple: Exploring the usability of system-assigned passphrases – Richard Shay, Patrick Gage Kelley, Saranga Kom, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor - 2012
1 A Meta-Scheme for Authentication Using Text Adventures – Carson Dylan Brown - 2010
This product is part of the RAND Infrastructure, Safety, and Environment – Joel B. Predd, Andrew, M. Parker - 2009