메뉴 건너뛰기




Volumn , Issue , 2009, Pages 375-390

It's no secret Measuring the security and reliability of authentication via 'secret' questions

Author keywords

[No Author keywords available]

Indexed keywords

MICROSOFT; USER STUDY; WEBMAIL;

EID: 70449688213     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2009.11     Document Type: Conference Paper
Times cited : (134)

References (17)
  • 3
    • 84869688764 scopus 로고    scopus 로고
    • CommonwealthBank. NetBank NetCode SMS, 2008. http://www.commbank.com.au/ netbank/netcodesms/.
    • (2008) NetBank NetCode SMS
  • 5
    • 70449654857 scopus 로고    scopus 로고
    • Designing authentication systems with challenge questions
    • In L. F. Cranor and S. Garfinkel, editors, Sebastopol, CA, O'Reilly Media, Inc
    • M. Just. Designing authentication systems with challenge questions. In L. F. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use, pages 143-155, Sebastopol, CA, 2005. O'Reilly Media, Inc.
    • (2005) Security and Usability: Designing Secure Systems that People Can Use , pp. 143-155
    • Just, M.1
  • 8
    • 84869670669 scopus 로고    scopus 로고
    • H. P. Ltd
    • H. P. Ltd. Top 20 websites, 2008. http://www.hitwise.com/datacenter/ rankings.php.
    • (2008) Top 20 Websites
  • 9
    • 84869676744 scopus 로고    scopus 로고
    • May
    • Microsoft Corporation. Windows live hotmail fact sheet, May 2007. http://www.microsoft.com/presspass/newsroom/msn/factsheet/hotmail.mspx.
    • (2007) Windows Live Hotmail Fact Sheet
  • 11
    • 65449137148 scopus 로고    scopus 로고
    • Personal knowledge questions for fallback authentication: Security questions in the era of facebook
    • New York, NY, USA, ACM
    • A. Rabkin. Personal knowledge questions for fallback authentication: security questions in the era of facebook. In SOUPS '08: Proceedings of the 4th Symposium on Usable Privacy and Security, pages 13- 23, New York, NY, USA, 2008. ACM.
    • (2008) SOUPS '08: Proceedings of the 4th Symposium on Usable Privacy and Security , pp. 13-23
    • Rabkin, A.1
  • 13
    • 34548786769 scopus 로고    scopus 로고
    • The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
    • Washington, DC, USA, May 20-23, IEEE Computer Society
    • S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 51- 65, Washington, DC, USA, May 20-23 2007. IEEE Computer Society.
    • (2007) Proceedings of the 2007 IEEE Symposium on Security and Privacy , pp. 51-65
    • Schechter, S.E.1    Dhamija, R.2    Ozment, A.3    Fischer, I.4
  • 14
    • 70350714665 scopus 로고    scopus 로고
    • What would you do if you logged onto your e-mail and received an unfamiliar message: 'User name and password do not match'?
    • Oct. 4
    • R. Stross. What would you do if you logged onto your e-mail and received an unfamiliar message: 'user name and password do not match'? The New York Times, Oct. 4, 2008. http://www.nytimes.com/2008/10/05/business/05digi.html.
    • (2008) The New York Times
    • Stross, R.1
  • 15
    • 84869690470 scopus 로고    scopus 로고
    • 'Forgot your password?' may be weakest link
    • Aug. 26
    • B. Sullivan. 'forgot your password?' may be weakest link. MSNBC Red Tape Chronicles, Aug. 26, 2008. http://redtape.msnbc.com/2008/08/almosteveryone.html.
    • (2008) MSNBC Red Tape Chronicles
    • Sullivan, B.1
  • 17
    • 0025497417 scopus 로고
    • User authentication by cognitive passwords: An empirical assessment
    • Los Alamitos, CA, USA, IEEE Computer Society Press
    • M. Zviran and W. J. Haga. User authentication by cognitive passwords: an empirical assessment. In JCIT: Proceedings of the Fifth Jerusalem Conference on Information technology, pages 137-144, Los Alamitos, CA, USA, 1990. IEEE Computer Society Press.
    • (1990) JCIT: Proceedings of the Fifth Jerusalem Conference on Information Technology , pp. 137-144
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.