Katsini et al., 2016 - Google Patents
Security and usability in knowledge-based user authentication: A reviewKatsini et al., 2016
View PDF- Document ID
- 3686752827076985892
- Author
- Katsini C
- Belk M
- Fidas C
- Avouris N
- Samaras G
- Publication year
- Publication venue
- Proceedings of the 20th Pan-Hellenic conference on informatics
External Links
Snippet
This paper presents a comprehensive review of state-of-the-art research works in knowledge-based user authentication, covering the security and usability aspects of the most prominent user authentication schemes; text-, pin-and graphical-based. From the …
- 238000011160 research 0 abstract description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Katsini et al. | Security and usability in knowledge-based user authentication: A review | |
Uellenbeck et al. | Quantifying the security of graphical passwords: The case of android unlock patterns | |
Bonneau | Guessing human-chosen secrets | |
Raza et al. | A survey of password attacks and comparative analysis on methods for secure authentication | |
US20130263240A1 (en) | Method for authentication and verification of user identity | |
Grobler et al. | The importance of social identity on password formulations | |
Alhakami | Knowledge based authentication techniques and challenges | |
Sae-Bae et al. | Distinguishability of keystroke dynamic template | |
Siadati et al. | Fortifying android patterns using persuasive security framework | |
Fatima et al. | A novel text-based user authentication scheme using pseudo-dynamic password | |
Wiercioch et al. | The Authentication Dilemma. | |
Alsuhibany | A Camouflage Text‐Based Password Approach for Mobile Devices against Shoulder‐Surfing Attack | |
Gao et al. | Usability and security of the recall-based graphical password schemes | |
Khodadadi et al. | Security analysis method of recognition-based graphical password | |
Schwab et al. | Picture PassDoodle: usability study | |
Krol et al. | “Too taxing on the mind!” Authentication grids are not for everyone | |
Malutan et al. | Web authentication methods using single sign on method and virtual keyboard | |
LIM | Multi-grid background Pass-Go | |
Yeole | Proposal for novel 3D password for providing authentication in critical web applications | |
Kumar et al. | PassPattern System (PPS): a pattern-based user authentication scheme | |
Ibrahim et al. | Touch gesture-based authentication: A security analysis of pattern unlock | |
Kim et al. | Secure and Usable Bio-Passwords based on Confidence Interval. | |
Majdalawieh et al. | Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking | |
Kaur et al. | Multi-Factor Graphical Password for Cloud Interface Authentication Security | |
HARUNA | A CASCADE MULTI-STAGE ONE-TIME PASSWORD, TEXTUAL AND RECALL-BASED GRAPHICAL PASSWORD FOR ONLINE AUTHENTICATION B |