{"id":"https://openalex.org/W2219338318","doi":"https://doi.org/10.1145/2841113.2841114","title":"Choose Your Own Authentication","display_name":"Choose Your Own Authentication","publication_year":2015,"publication_date":"2015-09-08","ids":{"openalex":"https://openalex.org/W2219338318","doi":"https://doi.org/10.1145/2841113.2841114","mag":"2219338318"},"language":"en","primary_location":{"id":"doi:10.1145/2841113.2841114","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2841113.2841114","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 New Security Paradigms Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088720987","display_name":"Alain Forget","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Alain Forget","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048641215","display_name":"Sonia Chiasson","orcid":"https://orcid.org/0000-0001-7314-2198"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Sonia Chiasson","raw_affiliation_strings":["Carleton University, Ottawa, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, Ontario, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010995209","display_name":"Robert Biddle","orcid":"https://orcid.org/0000-0001-5971-2705"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Robert Biddle","raw_affiliation_strings":["Carleton University, Ottawa, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, Ontario, Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088720987"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":5.5622,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.95910252,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9739000201225281,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9563999772071838,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7933288812637329},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7581000328063965},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7349845767021179},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.687768816947937},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6394845843315125},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6229358911514282},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5831996202468872},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.49768808484077454},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.49657493829727173},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.49460193514823914},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4417720139026642},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4388885498046875},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.43839046359062195},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.4357767701148987},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4293179214000702},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.19548726081848145},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.17185398936271667},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.14268603920936584},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11277899146080017}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7933288812637329},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7581000328063965},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7349845767021179},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.687768816947937},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6394845843315125},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6229358911514282},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5831996202468872},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.49768808484077454},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.49657493829727173},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.49460193514823914},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4417720139026642},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4388885498046875},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.43839046359062195},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.4357767701148987},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4293179214000702},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.19548726081848145},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.17185398936271667},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.14268603920936584},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11277899146080017},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2841113.2841114","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2841113.2841114","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 New Security Paradigms Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2345399485","display_name":null,"funder_award_id":"950-227625","funder_id":"https://openalex.org/F4320320994","funder_display_name":"Canada Research Chairs"},{"id":"https://openalex.org/G4891297072","display_name":null,"funder_award_id":"RGPIN 418481-2012","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"}],"funders":[{"id":"https://openalex.org/F4320320994","display_name":"Canada Research Chairs","ror":"https://ror.org/0517h6h17"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W32152403","https://openalex.org/W95892887","https://openalex.org/W160186554","https://openalex.org/W1466389411","https://openalex.org/W1607915502","https://openalex.org/W1980988531","https://openalex.org/W1988463028","https://openalex.org/W1990935444","https://openalex.org/W1993252585","https://openalex.org/W2002072414","https://openalex.org/W2014580322","https://openalex.org/W2014833947","https://openalex.org/W2025977842","https://openalex.org/W2026879388","https://openalex.org/W2030112111","https://openalex.org/W2037202491","https://openalex.org/W2041373240","https://openalex.org/W2044798763","https://openalex.org/W2045591401","https://openalex.org/W2046378201","https://openalex.org/W2054702684","https://openalex.org/W2074551623","https://openalex.org/W2075808188","https://openalex.org/W2082198354","https://openalex.org/W2090949570","https://openalex.org/W2097267243","https://openalex.org/W2109744978","https://openalex.org/W2111303254","https://openalex.org/W2113266120","https://openalex.org/W2119545418","https://openalex.org/W2123368970","https://openalex.org/W2126311339","https://openalex.org/W2126453598","https://openalex.org/W2129347810","https://openalex.org/W2131906261","https://openalex.org/W2133824719","https://openalex.org/W2149338394","https://openalex.org/W2149929743","https://openalex.org/W2150341374","https://openalex.org/W2157298821","https://openalex.org/W2171920515","https://openalex.org/W2493561953","https://openalex.org/W2744860591","https://openalex.org/W2883512297","https://openalex.org/W3094202663","https://openalex.org/W4252085685","https://openalex.org/W4256005559","https://openalex.org/W4285719527","https://openalex.org/W4299301436","https://openalex.org/W6651057343"],"related_works":["https://openalex.org/W2093798919","https://openalex.org/W2393298610","https://openalex.org/W2907262898","https://openalex.org/W3022695109","https://openalex.org/W2390304521","https://openalex.org/W2050433615","https://openalex.org/W2352114587","https://openalex.org/W4253316174","https://openalex.org/W3043788631","https://openalex.org/W128488073"],"abstract_inverted_index":{"To":[0],"solve":[1],"the":[2,47,58,120,126],"long-standing":[3,59],"problems":[4],"users":[5,86,98],"have":[6,20],"in":[7,32],"creating":[8],"and":[9,41,108,139],"remembering":[10],"text":[11,43,112],"passwords,":[12],"a":[13,80,89],"wide":[14],"variety":[15],"of":[16,24,128,141],"alternative":[17,156],"authentication":[18,64,82,129,143],"schemes":[19,26],"been":[21],"proposed.":[22],"Some":[23],"these":[25],"outperform":[27,38],"others":[28],"by":[29,69],"various":[30,33],"metrics":[31],"contexts.":[34],"However,":[35],"none":[36],"unilaterally":[37],"all":[39],"others,":[40],"so":[42],"passwords":[44],"persist":[45],"as":[46],"main":[48],"scheme":[49,65,90,102],"applications":[50],"depend":[51],"upon.":[52],"In":[53],"this":[54],"paper,":[55],"we":[56],"challenge":[57],"assumption":[60],"that":[61,84,150,161],"only":[62],"one":[63],"can":[66],"be":[67,117],"offered":[68],"an":[70],"application":[71],"service.":[72],"We":[73],"propose":[74],"Choose":[75],"Your":[76],"Own":[77],"Authentication":[78],"(CYOA):":[79],"novel":[81,142],"architecture":[83,122,135],"enables":[85],"to":[87,99,131,154],"choose":[88],"amongst":[91],"several":[92],"available":[93],"alternatives.":[94],"CYOA":[95,162],"would":[96,123],"enable":[97,124],"select":[100],"whichever":[101],"best":[103],"suits":[104],"their":[105,165],"preferences,":[106],"abilities,":[107],"usage":[109],"context.":[110],"Existing":[111],"password":[113],"systems":[114,130],"could":[115,163],"easily":[116],"replaced.":[118],"Furthermore,":[119],"three-party":[121],"delegating":[125],"management":[127],"trusted-third":[132],"parties.":[133],"The":[134],"allows":[136],"rapid":[137],"deployment":[138],"testing":[140],"technologies.":[144],"Our":[145],"two-week":[146],"usability":[147],"study":[148],"suggests":[149],"participants":[151],"were":[152,159],"willing":[153],"leverage":[155],"schemes.":[157],"Participants":[158],"confident":[160],"keep":[164],"financial":[166],"information":[167],"secure.":[168]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
