{"id":"https://openalex.org/W2162176660","doi":"https://doi.org/10.1145/1180405.1180427","title":"Fourth-factor authentication","display_name":"Fourth-factor authentication","publication_year":2006,"publication_date":"2006-10-30","ids":{"openalex":"https://openalex.org/W2162176660","doi":"https://doi.org/10.1145/1180405.1180427","mag":"2162176660"},"language":"en","primary_location":{"id":"doi:10.1145/1180405.1180427","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1180405.1180427","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052241357","display_name":"John Brainard","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"John Brainard","raw_affiliation_strings":["RSA Laboratories, Bedford, MA"],"affiliations":[{"raw_affiliation_string":"RSA Laboratories, Bedford, MA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056555550","display_name":"Ari Juels","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ari Juels","raw_affiliation_strings":["RSA Laboratories, Bedford, MA"],"affiliations":[{"raw_affiliation_string":"RSA Laboratories, Bedford, MA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051087399","display_name":"Ronald L. Rivest","orcid":null},"institutions":[{"id":"https://openalex.org/I4210110987","display_name":"IIT@MIT","ror":"https://ror.org/01wp8zh54","country_code":"US","type":"facility","lineage":["https://openalex.org/I30771326","https://openalex.org/I4210110987"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ronald L. Rivest","raw_affiliation_strings":["MIT CSAIL, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"MIT CSAIL, Cambridge, MA","institution_ids":["https://openalex.org/I4210110987"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071589402","display_name":"Michael Szydlo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Michael Szydlo","raw_affiliation_strings":["RSA Laboratories, Bedford, MA"],"affiliations":[{"raw_affiliation_string":"RSA Laboratories, Bedford, MA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030243906","display_name":"Moti Yung","orcid":"https://orcid.org/0000-0003-0848-0873"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Moti Yung","raw_affiliation_strings":["RSA Laboratories, Bedford, MA"],"affiliations":[{"raw_affiliation_string":"RSA Laboratories, Bedford, MA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5052241357"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":24.2436,"has_fulltext":false,"cited_by_count":205,"citation_normalized_percentile":{"value":0.99347729,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.756018877029419},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6958091259002686},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6491571664810181},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.6107656955718994},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6033874154090881},{"id":"https://openalex.org/keywords/chip-authentication-program","display_name":"Chip Authentication Program","score":0.5672648549079895},{"id":"https://openalex.org/keywords/email-authentication","display_name":"Email authentication","score":0.5154362916946411},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5079482197761536},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5072922110557556},{"id":"https://openalex.org/keywords/desk","display_name":"Desk","score":0.4759368896484375},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.421131432056427},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3819658160209656},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.10299170017242432}],"concepts":[{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.756018877029419},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6958091259002686},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6491571664810181},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.6107656955718994},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6033874154090881},{"id":"https://openalex.org/C142124187","wikidata":"https://www.wikidata.org/wiki/Q5101471","display_name":"Chip Authentication Program","level":5,"score":0.5672648549079895},{"id":"https://openalex.org/C550791530","wikidata":"https://www.wikidata.org/wiki/Q5368811","display_name":"Email authentication","level":5,"score":0.5154362916946411},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5079482197761536},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5072922110557556},{"id":"https://openalex.org/C2776545233","wikidata":"https://www.wikidata.org/wiki/Q1064858","display_name":"Desk","level":2,"score":0.4759368896484375},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.421131432056427},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3819658160209656},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.10299170017242432},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1180405.1180427","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1180405.1180427","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th ACM conference on Computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W101424076","https://openalex.org/W173470260","https://openalex.org/W1505010935","https://openalex.org/W1511039991","https://openalex.org/W1607915502","https://openalex.org/W1837588081","https://openalex.org/W1998410860","https://openalex.org/W2116897550","https://openalex.org/W4244781878","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2393298610","https://openalex.org/W4253316174","https://openalex.org/W2093798919","https://openalex.org/W2390304521","https://openalex.org/W2941888532","https://openalex.org/W2183793056","https://openalex.org/W3022695109","https://openalex.org/W3011316886","https://openalex.org/W2161818407","https://openalex.org/W2102741679"],"abstract_inverted_index":{"User":[0],"authentication":[1,49,110,144],"in":[2,66,118],"computing":[3],"systems":[4],"traditionally":[5],"depends":[6],"on":[7,89,139],"three":[8],"factors:":[9],"something":[10,17,24],"you":[11,18,25,47],"have":[12],"(e.g.,":[13,20,27],"a":[14,21,28,35,77,133,141],"hardware":[15,127,143],"token),":[16],"are":[19],"fingerprint),":[22],"and":[23,73,159],"know":[26],"password).":[29],"In":[30,57],"this":[31,98],"paper,":[32,99],"we":[33,100],"explore":[34,101,115],"fourth":[36],"factor,":[37],"the":[38,42,58,84,102],"social":[39,157],"network":[40],"of":[41,60,80,86,104,156],"user,":[43],"that":[44,106],"is,":[45,107],"somebody":[46],"know.Human":[48],"through":[50],"mutual":[51],"acquaintance":[52],"is":[53],"an":[54],"age-old":[55],"practice.":[56],"arena":[59],"computer":[61],"security,":[62],"it":[63],"plays":[64],"roles":[65],"privilege":[67],"delegation,":[68],"peer-level":[69],"certification,":[70],"help-desk":[71],"assistance,":[72],"reputation":[74],"networks.":[75],"As":[76],"direct":[78],"means":[79],"logical":[81],"authentication,":[82,120],"though,":[83],"reliance":[85],"human":[87],"being":[88],"another":[90],"has":[91],"little":[92],"supporting":[93],"scientific":[94],"literature":[95],"or":[96,126],"practice.In":[97],"notion":[103],"vouching,":[105],"peer-level,":[108],"human-intermediated":[109],"for":[111],"access":[112],"control.":[113],"We":[114,131,146],"its":[116],"use":[117],"emergency":[119],"when":[121],"primary":[122],"authenticators":[123],"like":[124],"passwords":[125],"tokens":[128],"become":[129],"unavailable.":[130],"describe":[132],"practical,":[134],"prototype":[135],"vouching":[136],"system":[137],"based":[138],"SecurID,":[140],"popular":[142],"token.":[145],"address":[147],"traditional,":[148],"cryptographic":[149],"security":[150],"requirements,":[151],"but":[152],"also":[153],"consider":[154],"questions":[155],"engineering":[158],"user":[160],"behavior.":[161]},"counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":15},{"year":2017,"cited_by_count":16},{"year":2016,"cited_by_count":14},{"year":2015,"cited_by_count":13},{"year":2014,"cited_by_count":15},{"year":2013,"cited_by_count":14},{"year":2012,"cited_by_count":17}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
