Sciweavers

OZCHI
2006
ACM

Question-based group authentication

14 years 5 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents caused by intruders; or to provide access to common domains such as computer labs. In some of these situations the implications of unauthorized access are negligible. Thus, using an expensive authentication technique, in terms of equipment and maintenance, or requiring significant effort from the user, is wasteful and unjustified. Passwords are the cheapest access control mechanism but have memorability issues. As a result, various alternatives have been proposed. These solutions are often either insecure or expensive in terms of data collection and maintenance. In this paper we present a solution that is less costly since it is built on the data produced by user-system interactions. The mechanism relies on a dynamic (and unpredictable) shared secret. We report on our investigation into differentiating between ...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
Added 14 Jun 2010
Updated 14 Jun 2010
Type Conference
Year 2006
Where OZCHI
Authors Ann Nosseir, Richard C. H. Connor, Karen Renaud
Comments (0)