Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2009
DOI: 10.1145/1518701.1519003
|View full text |Cite
|
Sign up to set email alerts
|

It's not what you know, but who you know

Abstract: Backup authentication mechanisms help users who have forgotten their passwords regain access to their accounts-or at least try. The security and reliability of today's backup authentication mechanisms have significant room for improvement. We designed, built, and tested a new authentication system that employs social-authentication. The system employs trustees previously appointed by the account holder to verify the account holder's identity. We ran three experiments to determine whether the system could (1) r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 57 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…In [31], the authors introduced a new social authentication approach based on trustees, that will allow users to access their accounts after having forgotten or lost the credentials. Trustees, that are people chosen by the account holders, will have the burden of identifying the account holder either in person (identification by appearance) or by phone (identification by voice).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [31], the authors introduced a new social authentication approach based on trustees, that will allow users to access their accounts after having forgotten or lost the credentials. Trustees, that are people chosen by the account holders, will have the burden of identifying the account holder either in person (identification by appearance) or by phone (identification by voice).…”
Section: Related Workmentioning
confidence: 99%
“…Other approaches, instead, rely on people to securely recover the password. In [31], for example, the authors introduced a new social authentication approach based on trustees. Trustees are people selected by the account holder that will have the burden of identifying her either in person (identification by appearance) or by phone (identification by voice).…”
Section: Other Password Recovery Mechanismsmentioning
confidence: 99%
“…In trustee-based social authentication [11], [12], [13], [14], [15], the user or the service provider pre-selects a few friends of the user as trustees, who aid the user in the authentication process. Knowledge-based social authentication [3], [2], [4], [5], [6] utilizes a user's friends' information for authentication, and thus knowledge-based social authentication relies on the user's knowledge about their friends.…”
Section: Related Workmentioning
confidence: 99%
“…Originally, Brainard et al combined trustee-based social authentications with other authenticators (e.g., passwords) as a two-factor authentication mechanism. Later, trustee-based social authentication was adapted to be used as a backup authenticator [13], [14], [12]. For instance, Schechter et al [12] designed and built a prototype of trusteebased social authentication system which was integrated into Microsoft's Windows Live ID system.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation