{"id":"https://openalex.org/W2585617674","doi":"https://doi.org/10.1145/3003733.3003764","title":"Security and Usability in Knowledge-based User Authentication","display_name":"Security and Usability in Knowledge-based User Authentication","publication_year":2016,"publication_date":"2016-11-10","ids":{"openalex":"https://openalex.org/W2585617674","doi":"https://doi.org/10.1145/3003733.3003764","mag":"2585617674"},"language":"en","primary_location":{"id":"doi:10.1145/3003733.3003764","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3003733.3003764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th Pan-Hellenic Conference on Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090690337","display_name":"Christina Katsini","orcid":"https://orcid.org/0000-0003-4418-7199"},"institutions":[{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Christina Katsini","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Patras, Rio, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Patras, Rio, Greece","institution_ids":["https://openalex.org/I174878644"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071818231","display_name":"Marios Belk","orcid":"https://orcid.org/0000-0001-6200-0178"},"institutions":[{"id":"https://openalex.org/I34771391","display_name":"University of Cyprus","ror":"https://ror.org/02qjrjx09","country_code":"CY","type":"education","lineage":["https://openalex.org/I34771391"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Marios Belk","raw_affiliation_strings":["Department of Computer Science, University of Cyprus, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Cyprus, Nicosia, Cyprus","institution_ids":["https://openalex.org/I34771391"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050671131","display_name":"Christos Fidas","orcid":"https://orcid.org/0000-0001-6111-0244"},"institutions":[{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Christos Fidas","raw_affiliation_strings":["Department of Cultural, Heritage Management and New Technologies, University of Patras, Rio, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Cultural, Heritage Management and New Technologies, University of Patras, Rio, Greece","institution_ids":["https://openalex.org/I174878644"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033822411","display_name":"Nikolaos Avouris","orcid":"https://orcid.org/0000-0001-5408-1844"},"institutions":[{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Nikolaos Avouris","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Patras, Rio, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Patras, Rio, Greece","institution_ids":["https://openalex.org/I174878644"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088484575","display_name":"George Samaras","orcid":null},"institutions":[{"id":"https://openalex.org/I34771391","display_name":"University of Cyprus","ror":"https://ror.org/02qjrjx09","country_code":"CY","type":"education","lineage":["https://openalex.org/I34771391"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"George Samaras","raw_affiliation_strings":["Department of Computer Science, University of Cyprus, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Cyprus, Nicosia, Cyprus","institution_ids":["https://openalex.org/I34771391"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5090690337"],"corresponding_institution_ids":["https://openalex.org/I174878644"],"apc_list":null,"apc_paid":null,"fwci":6.6348,"has_fulltext":false,"cited_by_count":48,"citation_normalized_percentile":{"value":0.96786116,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13155","display_name":"Digital Communication and Language","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.9692999720573425,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7959303855895996},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7851537466049194},{"id":"https://openalex.org/keywords/human-computer-interaction-in-information-security","display_name":"Human-computer interaction in information security","score":0.6112340092658997},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5942825078964233},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.5106621384620667},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.4927518665790558},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46552297472953796},{"id":"https://openalex.org/keywords/usability-engineering","display_name":"Usability engineering","score":0.4253900647163391},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.42426547408103943},{"id":"https://openalex.org/keywords/cognitive-walkthrough","display_name":"Cognitive walkthrough","score":0.4185924530029297},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4154513478279114},{"id":"https://openalex.org/keywords/web-usability","display_name":"Web usability","score":0.4137248992919922},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.34928256273269653},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.1553305685520172},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.15018004179000854},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.13765579462051392}],"concepts":[{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7959303855895996},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7851537466049194},{"id":"https://openalex.org/C6353995","wikidata":"https://www.wikidata.org/wiki/Q17027910","display_name":"Human-computer interaction in information security","level":5,"score":0.6112340092658997},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5942825078964233},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.5106621384620667},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.4927518665790558},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46552297472953796},{"id":"https://openalex.org/C100302975","wikidata":"https://www.wikidata.org/wiki/Q1642623","display_name":"Usability engineering","level":3,"score":0.4253900647163391},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.42426547408103943},{"id":"https://openalex.org/C87105883","wikidata":"https://www.wikidata.org/wiki/Q1107002","display_name":"Cognitive walkthrough","level":4,"score":0.4185924530029297},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4154513478279114},{"id":"https://openalex.org/C4237393","wikidata":"https://www.wikidata.org/wiki/Q1636686","display_name":"Web usability","level":3,"score":0.4137248992919922},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.34928256273269653},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.1553305685520172},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.15018004179000854},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.13765579462051392}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3003733.3003764","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3003733.3003764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th Pan-Hellenic Conference on Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W40612354","https://openalex.org/W78137777","https://openalex.org/W128619364","https://openalex.org/W167157979","https://openalex.org/W821002660","https://openalex.org/W1031568506","https://openalex.org/W1145190218","https://openalex.org/W1463944966","https://openalex.org/W1481533960","https://openalex.org/W1503108337","https://openalex.org/W1521031302","https://openalex.org/W1549671385","https://openalex.org/W1972287692","https://openalex.org/W1980235022","https://openalex.org/W1980384741","https://openalex.org/W1980432433","https://openalex.org/W2007488200","https://openalex.org/W2007524456","https://openalex.org/W2014373104","https://openalex.org/W2014833947","https://openalex.org/W2041404167","https://openalex.org/W2050296478","https://openalex.org/W2054626033","https://openalex.org/W2097267243","https://openalex.org/W2111303254","https://openalex.org/W2112767991","https://openalex.org/W2113266120","https://openalex.org/W2115218409","https://openalex.org/W2125927592","https://openalex.org/W2126453598","https://openalex.org/W2145881505","https://openalex.org/W2150341374","https://openalex.org/W2167006959","https://openalex.org/W2340738312","https://openalex.org/W2408306699","https://openalex.org/W2500898028","https://openalex.org/W2978725006","https://openalex.org/W6630133823","https://openalex.org/W6713905761","https://openalex.org/W6739058471"],"related_works":["https://openalex.org/W2017322369","https://openalex.org/W2573096963","https://openalex.org/W2488259327","https://openalex.org/W110518437","https://openalex.org/W4249900088","https://openalex.org/W2238167322","https://openalex.org/W4230862284","https://openalex.org/W2580784735","https://openalex.org/W2556467320","https://openalex.org/W2955456485"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,40,96],"comprehensive":[4],"review":[5],"of":[6,20,71,79,98,150],"state-of-the-art":[7],"research":[8,136,146],"works":[9],"in":[10,51,83,106],"knowledge-based":[11],"user":[12,24,41,89,100],"authentication,":[13],"covering":[14],"the":[15,21,32,68,77,107,114,141,148],"security":[16,33,59,65],"and":[17,29,42,56,75,88,109,131,137,153],"usability":[18,69,78],"aspects":[19],"most":[22],"prominent":[23],"authentication":[25,52,81,101,155],"schemes;":[26],"text-,":[27],"pin-":[28],"graphical-based.":[30],"From":[31,67],"perspective,":[34],"we":[35,54,73],"analyze":[36],"current":[37,49],"threats":[38],"from":[39],"service":[43,118],"provider":[44],"perspective.":[45],"Furthermore,":[46],"based":[47,61],"on":[48,62],"practices":[50],"policies,":[53],"summarize":[55],"discuss":[57,76,130],"their":[58],"strengths":[60],"widely":[63],"applied":[64],"metrics.":[66],"point":[70],"view,":[72],"present":[74],"each":[80],"scheme":[82],"regards":[84],"with":[85,113,140],"task":[86],"performance":[87],"experience.":[90],"The":[91],"analysis":[92],"reveals":[93],"that":[94],"although":[95],"plethora":[97],"alternative":[99],"schemes":[102],"have":[103],"been":[104],"proposed":[105],"literature":[108],"users":[110],"interact":[111],"differently":[112],"various":[115],"alternatives,":[116],"online":[117],"providers":[119],"do":[120],"not":[121],"yet":[122],"adopt":[123],"alternatives":[124],"to":[125,143],"text-based":[126],"solutions.":[127],"We":[128],"further":[129,135],"identify":[132],"areas":[133],"for":[134],"improved":[138],"methodology":[139],"aim":[142],"drive":[144],"this":[145],"towards":[147],"design":[149],"sustainable,":[151],"secure":[152],"usable":[154],"approaches.":[156]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":6}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
