Introducing Survey++ : an extensible platform for testing the usability and security of credential recovery mechanisms
<p>Mainstream authentication procedures have usually relied on knowledge factors for determining whether to allow a user access to resources. Typically, a user is challenged to provide a token that they know to prove that they are authorised. In the case that this token (password, passphrase,...
Main Authors: | Taylor, V, Flechais, I |
---|---|
Format: | Working paper |
Language: | English |
Published: |
Centre for Doctoral Training in Cyber Security
2014
|
Subjects: |
Similar Items
-
Security of Certificate Transparency
by: Cohn-Gordon, K
Published: (2015) -
Safety to security in emerging ubiquitous computing models
by: Osborn, E
Published: (2015) -
Academic Cyber Security Research: Best Practice for Commercialisation
by: Dwyer, A
Published: (2015) -
Stereoscopic cyber security visualisations
by: van Rensburg, A
Published: (2015) -
A new lightweight data security system for data security in the cloud computing
by: Shameer Mohammed, et al.
Published: (2023-10-01)