2021
DOI: 10.1016/j.cose.2021.102487
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating fallback authentication research: A systematic literature review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…However, recovery emails and phone numbers remain target points for attacks because authentication depends on the level of security offered by email and communication channels which may be inadequate. In addition, all fallback authentication methods suffer from different security and usability issues, such as vulnerability to guessing attacks, which remain a common form of security attack ( Bonneau et al, 2012 ), and the memorability of fallback authentication data as a usability challenge ( AlHusain & Alkhalifah, 2021 ).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, recovery emails and phone numbers remain target points for attacks because authentication depends on the level of security offered by email and communication channels which may be inadequate. In addition, all fallback authentication methods suffer from different security and usability issues, such as vulnerability to guessing attacks, which remain a common form of security attack ( Bonneau et al, 2012 ), and the memorability of fallback authentication data as a usability challenge ( AlHusain & Alkhalifah, 2021 ).…”
Section: Introductionmentioning
confidence: 99%
“…This study aims to improve the security and usability of fallback authentication by focusing on static security questions. Static security questions were selected first because most of the recent studies conducted on fallback authentication have focused on dynamic security questions ( Albayram & M. Khan, 2016 ; Addas, Salehi-Abari & Thorpe , 2019 ; Anani & Ouda, 2017 ; Hang et al., 2015a ; AlHusain & Alkhalifah, 2021 ; Anvari, Pan & Zheng, 2020 ; Ebrahim & Vadakkumcheril, 2019 ; Albayram et al, 2015 ) with little attention paid to improving static security questions ( Micallef & N. Arachchilage, 2021 ; Bonneau et al, 2015 ; Schechter, A. Brush & Egelman, 2009 ; Schechter & Reeder, 2009 ). However, this limited used mechanism of static questions as fallback authentication has some limitations.…”
Section: Introductionmentioning
confidence: 99%