TY - GEN
T1 - Love and authentication
AU - Jakobsson, Markus
AU - Stolterman, Erik
AU - Wetzel, Susanne
AU - Yang, Liu
PY - 2008
Y1 - 2008
N2 - Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security practitioners have battled with the dilemma of how to authenticate people who have forgotten their passwords. Existing approaches suffer from high false positive and false negative rates, where the former is often due to low entropy or public availability of information, whereas the latter often is due to unclear or changing answers, or ambiguous or fault prone entry of the same. Good security questions should be based on long-lived personal preferences and knowledge, and avoid publicly available information. We show that many of the questions used by online matchmaking services are suitable as security questions. We first describe a new user interface approach suitable to such security questions that is offering a reduced risks of incorrect entry. We then detail the findings of experiments aimed at quantifying the security of our proposed method.
AB - Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security practitioners have battled with the dilemma of how to authenticate people who have forgotten their passwords. Existing approaches suffer from high false positive and false negative rates, where the former is often due to low entropy or public availability of information, whereas the latter often is due to unclear or changing answers, or ambiguous or fault prone entry of the same. Good security questions should be based on long-lived personal preferences and knowledge, and avoid publicly available information. We show that many of the questions used by online matchmaking services are suitable as security questions. We first describe a new user interface approach suitable to such security questions that is offering a reduced risks of incorrect entry. We then detail the findings of experiments aimed at quantifying the security of our proposed method.
KW - Entry error
KW - Password
KW - Reset
KW - Security
KW - Security question
UR - http://www.scopus.com/inward/record.url?scp=57649187363&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=57649187363&partnerID=8YFLogxK
U2 - 10.1145/1357054.1357087
DO - 10.1145/1357054.1357087
M3 - Conference contribution
AN - SCOPUS:57649187363
SN - 9781605580111
T3 - Conference on Human Factors in Computing Systems - Proceedings
SP - 197
EP - 200
BT - 26th Annual CHI Conference on Human Factors in Computing Systems, Conference Proceedings, CHI 2008
T2 - 26th Annual CHI Conference on Human Factors in Computing Systems, CHI 2008
Y2 - 5 April 2008 through 10 April 2008
ER -