S Wiefling, PR Jørgensen, S Thunem… - ACM Transactions on …, 2022 - dl.acm.org
Risk-based authentication (RBA) aims to protect users against attacks involving stolen passwords. RBA monitors features during login, and requests re-authentication when …
Risk-based authentication (RBA) is an adaptive security measure used to strengthen password-based authentication against account takeover attacks. Our study on 65 …
Risk-based authentication (RBA) is an adaptive security measure to strengthen password- based authentication. RBA monitors additional implicit features during password entry such …
Risk-based authentication (RBA) complements standard password-based logins by using knowledge about previously observed user behavior to prevent malicious login attempts …
Password-based authentication (PBA) remains the most popular form of user authentication on the web despite its long-understood insecurity. Given the deficiencies of PBA, many …
Risk-based authentication (RBA) extends authentication mechanisms to make them more robust against account takeover attacks, such as those using stolen passwords. RBA is …
Risk-based Authentication (RBA) is an adaptive security measure that improves the security of password-based authentication by protecting against credential stuffing, password …
S Ruoti, J Andersen, K Seamons - Twelfth Symposium on Usable …, 2016 - usenix.org
Even with years of research into new authentication technologies, passwords still dominate the authentication landscape. This is due primarily to a combination of security …
R Weiss, A De Luca - Proceedings of the 5th Nordic conference on …, 2008 - dl.acm.org
Authentication today mostly relies on passwords or personal identification numbers (PINs). Therefore the average user has to remember an increasing amount of PINs and passwords …