The Security of Lazy Users in Out-of-Band Authentication.
Moni NaorLior RotemGil SegevPublished in: TCC (2) (2018)
Keyphrases
- security mechanisms
- graphical password
- user authentication
- identity authentication
- authentication protocol
- security requirements
- fuzzy vault
- end users
- security issues
- recommender systems
- authentication scheme
- personal data
- identity based cryptography
- authentication mechanism
- trust relationships
- identity management
- security analysis
- security policies
- network security
- biometric data
- information security
- high security
- intrusion detection
- data encryption
- access control
- user interface
- key management
- social media
- collaborative filtering
- electronic payment
- authentication systems
- trusted third party
- smart card
- security services
- user centric
- resource constrained