It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions.
Stuart E. SchechterA. J. Bernheim BrushSerge EgelmanPublished in: IEEE Symposium on Security and Privacy (2009)
Keyphrases
- secret key
- secret sharing scheme
- authentication scheme
- encryption decryption
- authentication mechanism
- security mechanisms
- key management
- secret sharing
- authentication protocol
- key agreement
- security requirements
- smart card
- fuzzy vault
- mutual authentication
- secret data
- intrusion detection
- security systems
- security services
- security analysis
- secret information
- key distribution
- information security
- identity authentication
- identity based cryptography
- network security
- electronic payment
- authentication systems
- user authentication
- identity management
- security policies
- elliptic curve cryptography
- private key
- public key
- encryption scheme
- data security
- security protocols