Knowledge-based authentication

Known as: KBA, Secret answer, Secret question 
Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
PINs and patterns remain among the most widely used knowledge-based authentication schemes. As thermal cameras become ubiquitous… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
2013
2013
Published evaluation criteria for knowledge based authentication (KBA) methods do not provide a sufficiently formed framework to… (More)
Is this relevant?
2013
2013
Authentication is traditionally performed based on what you know, what you hold or what you are. The first is the most popular… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2012
Highly Cited
2012
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
2012
2012
An attempt is made to identify Key Biodiversity Areas in the Republic of Macedonia through the identification of internationally… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2007
2007
Knowledge-based authentication (KBA) has gained prominence as a user authentication method for electronic transactions. This… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
The weakness of knowledge-based authentication systems, such as passwords and Personal Identification Numbers (PINs), is well… (More)
  • table 1
  • table 3
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
An imbalanced training data set can pose serious problems for many real-world data mining tasks that employ SVMs to conduct… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 4
  • table 2
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Current secure systems suffer because they neglect the importance of human factors in security. We address a fundamental weakness… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
1997
1997
We consider the problem of analytically characterizing the set of all 2-D images that a group of 3-D features may produce, and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?