dc.contributor.author | Katsini, Christina P. | en |
dc.contributor.author | Belk, Marios | en |
dc.contributor.author | Fidas, Christos A. | en |
dc.contributor.author | Avouris, Nikolaos M. | en |
dc.contributor.author | Samaras, George S. | en |
dc.creator | Katsini, Christina P. | en |
dc.creator | Belk, Marios | en |
dc.creator | Fidas, Christos A. | en |
dc.creator | Avouris, Nikolaos M. | en |
dc.creator | Samaras, George S. | en |
dc.date.accessioned | 2019-11-13T10:40:40Z | |
dc.date.available | 2019-11-13T10:40:40Z | |
dc.date.issued | 2016 | |
dc.identifier.isbn | 978-1-4503-4789-1 | |
dc.identifier.uri | http://gnosis.library.ucy.ac.cy/handle/7/54233 | |
dc.description.abstract | This paper presents a comprehensive review of state-of-the-art research works in knowledge-based user authentication, covering the security and usability aspects of the most prominent user authentication schemes | en |
dc.description.abstract | text-, pinand graphical-based. From the security perspective, we analyze current threats from a user and service provider perspective. Furthermore, based on current practices in authentication policies, we summarize and discuss their security strengths based on widely applied security metrics. From the usability point of view, we present and discuss the usability of each authentication scheme in regards with task performance and user experience. The analysis reveals that although a plethora of alternative user authentication schemes have been proposed in the literature and users interact differently with the various alternatives, online service providers do not yet adopt alternatives to text-based solutions. We further discuss and identify areas for further research and improved methodology with the aim to drive this research towards the design of sustainable, secure and usable authentication approaches. © 2016 ACM. | en |
dc.publisher | Association for Computing Machinery | en |
dc.source | ACM International Conference Proceeding Series | en |
dc.source | 20th Pan-Hellenic Conference on Informatics, PCI 2016 | en |
dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85014836949&doi=10.1145%2f3003733.3003764&partnerID=40&md5=9aef18bd71d19d434a69dbaa43fb1fe5 | |
dc.subject | Knowledge based systems | en |
dc.subject | Authentication | en |
dc.subject | User interfaces | en |
dc.subject | User authentication | en |
dc.subject | Security and usabilities | en |
dc.subject | Usable security | en |
dc.subject | Authentication scheme | en |
dc.subject | Knowledge-based authentication | en |
dc.subject | Security metrics | en |
dc.subject | Usability engineering | en |
dc.subject | Usability metrics | en |
dc.subject | User authentication scheme | en |
dc.title | Security and usability in knowledge-based user authentication: A review | en |
dc.type | info:eu-repo/semantics/conferenceObject | |
dc.identifier.doi | 10.1145/3003733.3003764 | |
dc.author.faculty | 002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences | |
dc.author.department | Τμήμα Πληροφορικής / Department of Computer Science | |
dc.type.uhtype | Conference Object | en |
dc.description.notes | <p>Sponsors: Greek Computer Society (GCS) | en |
dc.description.notes | Technological Educational Institution of Athens (TEI) | en |
dc.description.notes | Conference code: 126223</p> | en |
dc.contributor.orcid | Belk, Marios [0000-0001-6200-0178] | |
dc.gnosis.orcid | 0000-0001-6200-0178 | |