Cited By
View all- Bailey KKapadia AVongsathorn LSmith SAtluri VWinslett M(2008)TwoKind authenticationProceedings of the 7th ACM workshop on Privacy in the electronic society10.1145/1456403.1456412(39-44)Online publication date: 27-Oct-2008
Users often log in to Internet sites from insecure computers and more recently have started divulging their email passwords to social-networking sites, thereby putting their private communications at risk. We propose and evaluate TwoKind Authentication, ...
Passwords are widely used for user authentication, but they are often difficult for a user to recall, easily cracked by automated programs, and heavily reused. Security questions are also used for secondary authentication. They are more memorable than ...
In an internet environment, such as UNIX, a remote user has to obtain the access right from a server before doing any job. The procedure of obtaining acess right is called a user authentication protocol. User authentication via user memorable password ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in