The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

J Bonneau, C Herley, PC Van Oorschot… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …

Systems, methods and apparatus for controlling access to mobile devices

CR Crawford, JS Nell - US Patent 8,346,217, 2013 - Google Patents
US8346217B2 - Systems, methods and apparatus for controlling access to mobile devices -
Google Patents US8346217B2 - Systems, methods and apparatus for controlling access to mobile …

Personal knowledge questions for fallback authentication: Security questions in the era of Facebook

A Rabkin - Proceedings of the 4th Symposium on Usable Privacy …, 2008 - dl.acm.org
Security questions (or challenge questions) are commonly used to authenticate users who
have lost their passwords. We examined the password retrieval mechanisms for a number of …

It's no secret. measuring the security and reliability of authentication via “secret” questions

S Schechter, AJB Brush… - 2009 30th IEEE …, 2009 - ieeexplore.ieee.org
All four of the most popular webmail providers-AOL, Google, Microsoft, and Yahoo!-rely on
personal questions as the secondary authentication secrets used to reset account …

Secrets, lies, and account recovery: Lessons from the use of personal knowledge questions at google

J Bonneau, E Bursztein, I Caron, R Jackson… - Proceedings of the 24th …, 2015 - dl.acm.org
We examine the first large real-world data set on personal knowledge question's security
and memorability from their deployment at Google. Our analysis confirms that secret …

Systems, methods and apparatus for authenticating access to enterprise resources

CR Crawford, JS Nell - US Patent 8,401,522, 2013 - Google Patents
An understanding of embodiments described in this dis closure and many of the attendant
advantages may be readily obtained by reference to the following detailed description when …

Personal choice and challenge questions: a security and usability assessment

M Just, D Aspinall - Proceedings of the 5th Symposium on Usable …, 2009 - dl.acm.org
Challenge questions are an increasingly important part of mainstream authentication
solutions, yet there are few published studies concerning their usability or security. This …

It's not what you know, but who you know: a social approach to last-resort authentication

S Schechter, S Egelman, RW Reeder - Proceedings of the sigchi …, 2009 - dl.acm.org
Backup authentication mechanisms help users who have forgotten their passwords regain
access to their accounts-or at least try. Today's systems fall short in meeting both security …

Accuracy of performance counter measurements

D Zaparanuks, M Jovic… - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
Many experimental performance evaluations depend on accurate measurements of the cost
of executing a piece of code. Often these measurements are conducted using infrastructures …

Selections: Internet voting with over-the-shoulder coercion-resistance

J Clark, U Hengartner - … Conference on Financial Cryptography and Data …, 2011 - Springer
We present Selections, a new cryptographic voting protocol that is end-to-end verifiable and
suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in …