[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Katsini et al., 2016 - Google Patents

Security and usability in knowledge-based user authentication: A review

Katsini et al., 2016

View PDF
Document ID
3686752827076985892
Author
Katsini C
Belk M
Fidas C
Avouris N
Samaras G
Publication year
Publication venue
Proceedings of the 20th Pan-Hellenic conference on informatics

External Links

Snippet

This paper presents a comprehensive review of state-of-the-art research works in knowledge-based user authentication, covering the security and usability aspects of the most prominent user authentication schemes; text-, pin-and graphical-based. From the …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Similar Documents

Publication Publication Date Title
Katsini et al. Security and usability in knowledge-based user authentication: A review
Uellenbeck et al. Quantifying the security of graphical passwords: The case of android unlock patterns
Bonneau Guessing human-chosen secrets
Raza et al. A survey of password attacks and comparative analysis on methods for secure authentication
US20130263240A1 (en) Method for authentication and verification of user identity
Grobler et al. The importance of social identity on password formulations
Alhakami Knowledge based authentication techniques and challenges
Sae-Bae et al. Distinguishability of keystroke dynamic template
Siadati et al. Fortifying android patterns using persuasive security framework
Fatima et al. A novel text-based user authentication scheme using pseudo-dynamic password
Wiercioch et al. The Authentication Dilemma.
Alsuhibany A Camouflage Text‐Based Password Approach for Mobile Devices against Shoulder‐Surfing Attack
Gao et al. Usability and security of the recall-based graphical password schemes
Khodadadi et al. Security analysis method of recognition-based graphical password
Schwab et al. Picture PassDoodle: usability study
Krol et al. “Too taxing on the mind!” Authentication grids are not for everyone
Malutan et al. Web authentication methods using single sign on method and virtual keyboard
LIM Multi-grid background Pass-Go
Yeole Proposal for novel 3D password for providing authentication in critical web applications
Kumar et al. PassPattern System (PPS): a pattern-based user authentication scheme
Ibrahim et al. Touch gesture-based authentication: A security analysis of pattern unlock
Kim et al. Secure and Usable Bio-Passwords based on Confidence Interval.
Majdalawieh et al. Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking
Kaur et al. Multi-Factor Graphical Password for Cloud Interface Authentication Security
HARUNA A CASCADE MULTI-STAGE ONE-TIME PASSWORD, TEXTUAL AND RECALL-BASED GRAPHICAL PASSWORD FOR ONLINE AUTHENTICATION B