Security question

Known as: Password hint, Security questions 
A security question is used as an authenticator by banks, cable companies and wireless providers as an extra security layer. They are a form of… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Fallback authentication is used to retrieve forgotten passwords. Security questions are one of the main techniques used to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
Growth of computing and analytics, internet and distributed computing, and increasing tendency to use crowd sourcing for creative… (More)
Is this relevant?
2015
2015
In this paper, we propose and evaluate the combination of location-based authentication with security questions as a more usable… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2015
2015
In this paper, we present the design and evaluation of dynamic security questions for fallback authentication. In case users lose… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2013
2013
  • 2013
Nigeria has been bedeviled by ethno-religious conflicts with devastating human and material losses since the return of democracy… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
It is often suggested that users are hopelessly lazy and unmotivated on security questions. They chose weak passwords, ignore… (More)
  • table 1
  • table 2
Is this relevant?
Review
2008
Review
2008
Security questions (or challenge questions) are commonly used to authenticate users who have lost their passwords. We examined… (More)
  • table 1
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Recommender systems are widely used to help deal with the problem of information overload. However, recommenders raise serious… (More)
  • figure 1
Is this relevant?
2005
2005
Computer system security is traditionally regarded as a primarily technological concern; the fundamental questions to which… (More)
  • figure 1
  • figure 2
Is this relevant?
2000
2000
Recent experience has shown, that interconnected systems are vulnerable to attacks, if security questions are not met… (More)
  • figure 1
  • table 1
Is this relevant?