Graphical and text based challenge questions for secure and usable authentication in online examinations.
Abrar UllahHannan XiaoTrevor BarkerMariana LilleyPublished in: ICITST (2014)
Keyphrases
- user authentication
- authentication scheme
- authentication mechanism
- identity management
- security requirements
- data encryption
- integrity verification
- security analysis
- security mechanisms
- password authentication
- factor authentication
- authentication protocol
- key distribution
- online learning
- security services
- lightweight
- access control
- key agreement protocol
- secure manner
- identity authentication
- rights management
- real time
- open ended questions
- public key encryption
- trusted third party
- digital watermarking
- security issues
- smart card
- visual features
- multimedia