It's no secret: measuring the security and reliability of authentication via 'secret' questions.
Stuart E. SchechterA. J. Bernheim BrushSerge EgelmanPublished in: SOUPS (2009)
Keyphrases
- secret key
- secret sharing scheme
- encryption decryption
- session key
- authentication mechanism
- identity authentication
- authentication scheme
- security mechanisms
- secret sharing
- key agreement
- authentication protocol
- smart card
- security analysis
- access control
- secure communication
- data encryption
- security requirements
- key distribution
- user authentication
- private key
- public key
- key management
- security level
- encryption scheme
- identity management
- public key infrastructure
- fuzzy vault
- public key cryptography
- high security
- secret information
- secret data
- security model
- security issues
- security services
- mutual authentication
- elliptic curve
- security protocols
- security policies
- information security
- intrusion detection