Filters








13,942 Hits in 5.9 sec

Fourth-factor authentication

John Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung
2006 Proceedings of the 13th ACM conference on Computer and communications security - CCS '06  
In this paper, we explore a fourth factor, the social network of the user, that is, somebody you know. Human authentication through mutual acquaintance is an age-old practice.  ...  User authentication in computing systems traditionally depends on three factors: something you have (e.g., a hardware token), something you are (e.g., a fingerprint), and something you know (e.g., a password  ...  Our work In this paper, we explore a fourth category of authenticator: "somebody you know." The use of human relationships for authentication is by no means new.  ... 
doi:10.1145/1180405.1180427 dblp:conf/ccs/BrainardJRSY06 fatcat:6m7ocqibjzeeteo5mtblsjno2a

Authentication Melee

Scott Ruoti, Brent Roberts, Kent Seamons
2015 Proceedings of the 24th International Conference on World Wide Web - WWW '15  
Even though usability is a key factor in replacing passwords, very few alternatives have been subjected to formal usability studies and even fewer have been analyzed using a standard metric.  ...  Authentication Melee: A Usability Analysis of Seven Web Passwords continue to dominate the authentication landscape in spite of numerous proposals to replace them.  ...  The Coolness Factor When participants described what authentication features they were most interested in, they often referred to the "coolness" of that feature.  ... 
doi:10.1145/2736277.2741683 dblp:conf/www/RuotiRS15 fatcat:5ylifol4enh7xmjdqu65nfk6fi

Authentication via Ambassadors: A Novel Authentication Mechanism in MANETs

Feng Li, Jie Wu
2007 MILCOM 2007 - IEEE Military Communications Conference  
We present a novel mechanism, Authentication Via Ambassadors, which authenticates mobile nodes based on their "social relationship".  ...  Ambassadors, which are moving nodes trusted by the cluster head, are selected and dispatched according to several different criteria to represent the region and perform authentication.  ...  In [1] , Brainard et al. explores a fourth factor: the social network (somebody you know). We extend this idea and use the fourth factor in the authentication mechanism.  ... 
doi:10.1109/milcom.2007.4455065 fatcat:ahtpxe765je3rautztvho2oqgm

A Survey on User Authentication Techniques

K Sharmila, V. Janaki, A Nagaraju
2017 Oriental journal of computer science and technology  
As factors increase, failure rate for authentication may also be more when any one of the factors doesn't work.  ...  Though technology is increasing tremendously, smart hackers on the environment always challenges the authentication factors, thereby enforcing more number of factors for authentication to be included.  ...  Four Factor Authentication Fourth Factor Authentication: Somebody You Know by John brainard, Ari Juels, Ronald L.  ... 
doi:10.13005/ojcst/10.02.37 fatcat:pkbkyhuztzdvfnl7b4tyhtttq4

Two factor authentication using mobile phones

Fadi Aloul, Syed Zahidi, Wassim El-Hajj
2009 2009 IEEE/ACS International Conference on Computer Systems and Applications  
This paper describes a method of implementing two factor authentication using mobile phones.  ...  The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner.  ...  Recent work has been done in trying alternative factors such as a fourth factor, e.g. somebody you know, which is based on the notion of vouching [10] .  ... 
doi:10.1109/aiccsa.2009.5069395 dblp:conf/aiccsa/AloulZE09 fatcat:nng6s3zvazavdbiwjb2au3zhri

Touristic quest for existential authenticity

Hyounggon Kim, Tazim Jamal
2007 Annals of Tourism Research  
The notion of existential authenticity is central to understanding the experience of regular, repeat festival-goers who take their participation seriously.  ...  The study supports the existential notion in terms of intrapersonal and interpersonal authenticity. Résumé: La quête touristique de l'authenticité existentielle.  ...  Mary, who played a fairy angel character, said: I can come out and be somebody else. My character is who I would be. You know, she is a beautiful character.  ... 
doi:10.1016/j.annals.2006.07.009 fatcat:uhs4n7lvf5fadmqnhq7sehhfau

Authentic Learning Environments [chapter]

Jan Herrington, Thomas C. Reeves, Ron Oliver
2013 Handbook of Research on Educational Communications and Technology  
One theory of learning which has the capacity to promote authentic learning is that of situated learning. vi Table of contents Abstract ii Declaration iv  ...  can ask somebody and they're right there next to you.  ...  you need to rather than have somebody lecture at you and get everything like 'soak, soak, soak'.  ... 
doi:10.1007/978-1-4614-3185-5_32 fatcat:vvm2car6r5aulduwofly2u7o3u

LRAP: A Location-Based Remote Client Authentication Protocol for Mobile Environments

Diana Berbecaru
2011 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing  
We propose LRAP, a novel protocol combining several authentication factors to securely authenticate a mobile user.  ...  In such services, the user's location might be used as authentication factor, in addition to the typical authentication factors, like passwords, or one time tokens combined with the use of a physical device  ...  Fourth Factor Authentication: that information and send SMS this code to the client. In Somebody You Know, Proc. of ACM CCS, the same way it sends decrypted key to Point of sale.  ... 
doi:10.1109/pdp.2011.32 dblp:conf/pdp/Berbecaru11 fatcat:tftg3obmcjdw7j2lay33jchayi

A SECURE COMMUNICATION IN SMART PHONES USING TWO FACTOR AUTHENTICATION

Soumya Murali .
2013 International Journal of Research in Engineering and Technology  
Two Factor Authentication (TFA) provides improved protection to the system at the client side by prompting to provide something they know and something they have.  ...  The OTP generation uses the factors that are unique to the user and is installed on a smart phone in Android platform owned by the user. An OTP is valid for a minutes time, after which, is useless.  ...  Once the identity of the human or machine is validated, access is granted. .Recent work has been done in trying alternative factors such as a fourth factor, e.g. somebody you know, which is based on the  ... 
doi:10.15623/ijret.2013.0202011 fatcat:3xmtln46dzd5dk42egunrvyp2a

Cultivating Positive Youth Development, Critical Consciousness, and Authentic Care in Urban Environmental Education

Jesse Delia, Marianne E. Krasny
2018 Frontiers in Psychology  
And you just really learn how to just, you know, be yourself. (Kimberlé, fourth-year intern).  ...  And. . . it's just really to better yourself, and not really to, you know, throw you down. (Kimberlé, fourth-year intern).  ... 
doi:10.3389/fpsyg.2017.02340 pmid:29379456 pmcid:PMC5775517 fatcat:vgp7gzmmdrakrfnknzm6clfvhu

On the Security of Trustee-Based Social Authentications

Neil Zhenqiang Gong, Di Wang
2014 IEEE Transactions on Information Forensics and Security  
Recently, authenticating users with the help of their friends (i.e., trustee-based social authentication) has been shown to be a promising backup authentication mechanism.  ...  Our results have strong implications for the design of more secure trustee-based social authentications.  ...  [4] proposed to use the fourth factor, i.e., somebody you know, to authenticate users. We call the fourth factor trustee-based social authentication.  ... 
doi:10.1109/tifs.2014.2330311 fatcat:2yj6z5n7nje2rhqxwnxdhhw724

Being authentic is the new image: a qualitative study on the authenticity constructions and self-images of Christian millennials in Africa

Victor Counted
2016 Mental Health, Religion & Culture  
cathartic and authentic living experience.  ...  By implication, looking at the issue of authenticity from an African context has produced an African conceptualisation of authenticity.  ...  They don't know why you are where you are, they don't know how you got to where you are, and they don't know how you feel about where you are, and now they make all kinds of judgments and assumptions and  ... 
doi:10.1080/13674676.2016.1168388 fatcat:y4scbspf3jhv3lv2uhcuxmrjom

"I'm Stuck!": A Contextual Inquiry of People with Visual Impairments in Authentication

Bryan Dosono, Jordan Hayes, Yang Wang
2015 Symposium On Usable Privacy and Security  
Each authentication scheme comes with its strengths and weaknesses.  ...  Research and development in identity management [1] categorize modern authentication schemes into three main types: knowledgebased, token-based and biometric authentication systems.  ...  • Does the smaller screen pose any additional/new challenges for you? • Are you familiar with two-factor authentication?  ... 
dblp:conf/soups/DosonoHW15 fatcat:lf2wxrm6trbkfb6veefmtndtum

Credibility, authenticity and voice: dilemmas in online interviewing

Nalita James, Hugh Busher
2006 Qualitative Research  
These include issues affecting the credibility and trustworthiness of the research design of the studies and issues around the authenticity of participants' voices and how that was affected by power and  ...  Had we 'cold-called' this would have made it difficult for us to know whether the online identity presented to us was that of the participant or an invented alias, or another person using somebody else's  ...  These factors tended to deprive participants of a sense of engagement in a human conversation and of a sense of security of knowing, even if incorrectly, who a researcher is socially, making them less  ... 
doi:10.1177/1468794106065010 fatcat:enhgyadt4vd5rkbtgzpmfgq6ja

A Multicomponent Conceptualization of Authenticity: Theory and Research [chapter]

Michael H. Kernis, Brian M. Goldman
2006 Advances in Experimental Social Psychology  
And if by chance I wake at night and I ask you who I am, oh take me to the slaughterhouse I will wait there with the lamb. -Leonard Cohen Whatever satisfies the soul is truth.  ...  We begin with a historical account of various philosophical perspectives on authentic functioning and briefly review several past and contemporary psychological perspectives on authenticity.  ...  An example scenario and response options is as follows: Your partner gives you a nice birthday present, but it is not what you have subtly let him/her know that you really wanted.  ... 
doi:10.1016/s0065-2601(06)38006-9 fatcat:chrqhijuyzel7o23yathokyqve
« Previous Showing results 1 — 15 out of 13,942 results