I Know What You Did Last Week! Do You?: Dynamic Security Questions for Fallback Authentication on Smartphones
暂无分享,去创建一个
[1] Robert W. Reeder,et al. 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication , 2009, SOUPS.
[2] Debin Gao,et al. Your love is public now: questioning the use of personal information in authentication , 2013, ASIA CCS '13.
[3] Konstantin Beznosov,et al. Know your enemy: the risk of unauthorized access in smartphones by insiders , 2013, MobileHCI '13.
[4] Serge Egelman,et al. It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[5] Ariel Rabkin,et al. Personal knowledge questions for fallback authentication: security questions in the era of Facebook , 2008, SOUPS '08.
[6] Liviu Iftode,et al. Building robust authentication systems with activity-based personal questions , 2009, SafeConfig '09.
[7] Markus Jakobsson,et al. Love and authentication , 2008, CHI.
[8] Angelos D. Keromytis,et al. All your face are belong to us: breaking Facebook's social authentication , 2012, ACSAC '12.
[9] Jason I. Hong,et al. Exploring capturable everyday memory for autobiographical authentication , 2013, UbiComp.
[10] Markus Jakobsson,et al. Messin' with Texas Deriving Mother's Maiden Names Using Public Records , 2005, ACNS.
[11] Serge Egelman,et al. It's not what you know, but who you know: a social approach to last-resort authentication , 2009, CHI.
[12] Mike Just,et al. Personal choice and challenge questions: a security and usability assessment , 2009, SOUPS.
[13] Steven Furnell,et al. An assessment of website password practices , 2007, Comput. Secur..
[14] William J. Haga,et al. Question-and-answer passwords: an empirical evaluation , 1991, Information Systems.
[15] Simson L. Garfinkel,et al. Email-Based Identification and Authentication: An Alternative to PKI? , 2003, IEEE Secur. Priv..
[16] Mike Just,et al. Designing and evaluating challenge-question systems , 2004, IEEE Security & Privacy Magazine.