2015
DOI: 10.1186/s13673-015-0032-3
|View full text |Cite
|
Sign up to set email alerts
|

Designing challenge questions for location‐based authentication systems: a real‐life study

Abstract: Online service providers often use challenge questions (a.k.a. knowledge-based authentication) to facilitate resetting of passwords or to provide an extra layer of security for authentication. While prior schemes explored both static and dynamic challenge questions to improve security, they do not systematically investigate the problem of designing challenge questions and its effect on user recall performance. Interestingly, as answering different styles of questions may require different amount of cognitive e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
17
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(18 citation statements)
references
References 14 publications
1
17
0
Order By: Relevance
“…Then, the expert system deducts the sensing operation that consumes unnecessary power using the unnecessary sensing search rule defined in this paper. Here are the necessary and sufficient conditions for the unnecessary sensing operation: 1 There are no sensors of the same type used for the exclusive contexts, and the exclusive contexts are inferred at the same time. 2 If the conditions of the sensors that have the same type and which are used for the exclusive contexts are not same, they are not disjointed.…”
Section: Low-power Sensingmentioning
confidence: 99%
See 2 more Smart Citations
“…Then, the expert system deducts the sensing operation that consumes unnecessary power using the unnecessary sensing search rule defined in this paper. Here are the necessary and sufficient conditions for the unnecessary sensing operation: 1 There are no sensors of the same type used for the exclusive contexts, and the exclusive contexts are inferred at the same time. 2 If the conditions of the sensors that have the same type and which are used for the exclusive contexts are not same, they are not disjointed.…”
Section: Low-power Sensingmentioning
confidence: 99%
“…In order to manage and operate multiple applications for sustainable context-aware service, it is essential to express their context-aware services by using general models. There are various types of general models as described below [13]: 1 Key-value models represent the simplest data structure for modeling contexts by exploiting pairs of two items, namely a key (attribute name) and its value. 2 Markup scheme models use XML-based representations to model a hierarchical data structure consisting of markup tags, attributes, and contents.…”
Section: Models For Sustainable Context-awarenessmentioning
confidence: 99%
See 1 more Smart Citation
“…If the authentication method is not robust, the attacker will intercept the MTD policy. In this regard, recently, Bayesian classifiers using question/response patterns have been studied to authenticate legitimate users [24]. Also, since the authentication server performs an operation similar to the DNS, techniques such as the latest research that provide DNS security based on a public key infrastructure rather than a certificate basis [25] can be applied in the authentication server.…”
Section: Architecturementioning
confidence: 99%
“…Table 2 is a description of the function modules constituting the five subsystems of the selfmutation system. The authentication and key management are responsible for authentication and key distribution for all entities [24,25]. The moving server and decoy host have interfaces for interactions by which to receive the mutation strategy from the management system.…”
Section: Architecturementioning
confidence: 99%