Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Knowledge-based authentication

Known as: KBA, Secret answer, Secret question 
Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
PINs and patterns remain among the most widely used knowledge-based authentication schemes. As thermal cameras become ubiquitous… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
Highly Cited
2012
Highly Cited
2012
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Abstract : The Knowledge Base Acceleration track in TREC 2012 focused on a single task: filter a time-ordered corpus for… Expand
  • figure 2
  • table 1
  • figure 3
  • table 2
  • table 3
Is this relevant?
2006
2006
As current knowledge-based systems do not take into account human limitations when recalling authenticating strings, individuals… Expand
  • figure 1
  • figure 5
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
The weakness of knowledge-based authentication systems, such as passwords and Personal Identification Numbers (PINs), is well… Expand
  • table 1
  • table 3
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
  • G. Wu, E. Chang
  • IEEE Transactions on Knowledge and Data…
  • 2005
  • Corpus ID: 7934922
An imbalanced training data set can pose serious problems for many real-world data mining tasks that employ SVMs to conduct… Expand
  • figure 1
  • table 1
  • figure 3
  • figure 4
  • table 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
  • D. Jacobs
  • International Journal of Computer Vision
  • 2004
  • Corpus ID: 19664721
We consider the problem of analytically characterizing the set of all 2-D images that a group of 3-D features may produce, and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The security research community has recently recognised that user behaviour plays a part in many security failures, and it has… Expand
  • figure 2
  • figure 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Abstract A new algorithm for performing parallel Sn sweeps on unstructured meshes is developed. The algorithm uses a low… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Current secure systems suffer because they neglect the importance of human factors in security. We address a fundamental weakness… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?