The Security of Lazy Users in Out-of-Band Authentication.
Moni NaorLior RotemGil SegevPublished in: ACM Trans. Priv. Secur. (2020)
Keyphrases
- security requirements
- identity authentication
- security mechanisms
- authentication mechanism
- end users
- graphical password
- security analysis
- recommender systems
- trusted third party
- identity management
- user authentication
- authentication protocol
- collaborative filtering
- identity based cryptography
- fuzzy vault
- user interface
- security systems
- information security
- user interaction
- integrity verification
- encryption decryption
- authentication systems
- access control
- user centric
- trust relationships
- security services
- security issues
- personal data
- key management
- data encryption
- smart card
- network security