{"id":"https://openalex.org/W4396832380","doi":"https://doi.org/10.1145/3613904.3642889","title":"A Comparative Long-Term Study of Fallback Authentication Schemes","display_name":"A Comparative Long-Term Study of Fallback Authentication Schemes","publication_year":2024,"publication_date":"2024-05-11","ids":{"openalex":"https://openalex.org/W4396832380","doi":"https://doi.org/10.1145/3613904.3642889"},"language":"en","primary_location":{"id":"doi:10.1145/3613904.3642889","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613904.3642889","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613904.3642889","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3613904.3642889","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046212991","display_name":"Leona Lassak","orcid":"https://orcid.org/0000-0001-8309-3211"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Leona Lassak","raw_affiliation_strings":["Ruhr University Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065482265","display_name":"Philipp Markert","orcid":"https://orcid.org/0000-0002-9232-4496"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Philipp Markert","raw_affiliation_strings":["Ruhr University Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069307193","display_name":"Maximilian Golla","orcid":"https://orcid.org/0000-0003-2204-2132"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Maximilian Golla","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033826888","display_name":"Elizabeth Stobert","orcid":"https://orcid.org/0009-0004-7949-0459"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Elizabeth Stobert","raw_affiliation_strings":["Carleton University, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110236021","display_name":"Markus D\u00fcrmuth","orcid":null},"institutions":[{"id":"https://openalex.org/I114112103","display_name":"Leibniz University Hannover","ror":"https://ror.org/0304hq317","country_code":"DE","type":"education","lineage":["https://openalex.org/I114112103"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Markus D\u00fcrmuth","raw_affiliation_strings":["Leibniz University Hannover, Germany"],"affiliations":[{"raw_affiliation_string":"Leibniz University Hannover, Germany","institution_ids":["https://openalex.org/I114112103"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5046212991"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":3.0537,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.9224887,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"19"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9746999740600586,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/term","display_name":"Term (time)","score":0.7158994674682617},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6335169672966003},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.547649085521698},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24726733565330505},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.0769343376159668}],"concepts":[{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.7158994674682617},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6335169672966003},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.547649085521698},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24726733565330505},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0769343376159668},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3613904.3642889","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613904.3642889","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613904.3642889","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:figshare.com:article/26114299","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/A_Comparative_Long-Term_Study_of_Fallback_Authentication_Schemes/26114299","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:hss-opus.ub.ruhr-uni-bochum.de:14166","is_oa":true,"landing_page_url":"https://hss-opus.ub.ruhr-uni-bochum.de/opus4/frontdoor/index/index/docId/14166","pdf_url":null,"source":{"id":"https://openalex.org/S4306400167","display_name":"Dokumentenrepositorium der RUB (Ruhr University Bochum)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I904495901","host_organization_name":"Ruhr University Bochum","host_organization_lineage":["https://openalex.org/I904495901"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doc-type:article"},{"id":"doi:10.60882/cispa.26114299.v1","is_oa":true,"landing_page_url":"https://doi.org/10.60882/cispa.26114299.v1","pdf_url":null,"source":{"id":"https://openalex.org/S7407050916","display_name":"CISPA Helmholtz Center","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1145/3613904.3642889","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613904.3642889","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613904.3642889","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.7400000095367432,"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4"}],"awards":[{"id":"https://openalex.org/G18682879","display_name":null,"funder_award_id":"390781972","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G5106512922","display_name":null,"funder_award_id":"Deutsche Forschungsgemeinschaft (DFG","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G5717916917","display_name":null,"funder_award_id":"39078197","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"}],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4396832380.pdf"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W172711948","https://openalex.org/W204466799","https://openalex.org/W1975845161","https://openalex.org/W1999298106","https://openalex.org/W2006809639","https://openalex.org/W2024562548","https://openalex.org/W2030112111","https://openalex.org/W2059621117","https://openalex.org/W2061422651","https://openalex.org/W2065343501","https://openalex.org/W2076245464","https://openalex.org/W2107942950","https://openalex.org/W2113231008","https://openalex.org/W2113936660","https://openalex.org/W2120308327","https://openalex.org/W2150341374","https://openalex.org/W2162176660","https://openalex.org/W2165565225","https://openalex.org/W2183819363","https://openalex.org/W2253893204","https://openalex.org/W2333683152","https://openalex.org/W2463444906","https://openalex.org/W2541640915","https://openalex.org/W2575005104","https://openalex.org/W2610906739","https://openalex.org/W2680793898","https://openalex.org/W2773293410","https://openalex.org/W2792577982","https://openalex.org/W2905913776","https://openalex.org/W3007255691","https://openalex.org/W3115024441","https://openalex.org/W3118164097","https://openalex.org/W3164343013","https://openalex.org/W3173957709","https://openalex.org/W4248763915","https://openalex.org/W4288022691","https://openalex.org/W4297659119"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Fallback":[0],"authentication,":[1],"the":[2,11,44,100,108,122],"process":[3],"of":[4,87,102,107,110,121],"re-establishing":[5],"access":[6],"to":[7,28,39,70,116],"an":[8],"account":[9],"when":[10],"primary":[12,40],"authenticator":[13],"is":[14,42],"unavailable,":[15],"holds":[16],"critical":[17],"significance.":[18],"Approaches":[19],"range":[20],"from":[21],"secondary":[22],"channels":[23],"like":[24],"email":[25,135],"and":[26,33,48,136,144,150],"SMS":[27],"personal":[29],"knowledge":[30],"questions":[31],"(PKQs)":[32],"social":[34],"authentication.":[35],"A":[36],"key":[37],"difference":[38],"authentication":[41,49,112,128],"that":[43,132],"duration":[45],"between":[46],"enrollment":[47],"can":[50],"be":[51],"much":[52],"longer,":[53],"typically":[54],"months":[55,115],"or":[56],"years.":[57],"However,":[58],"few":[59],"systems":[60,75],"have":[61],"been":[62],"studied":[63],"over":[64,113],"extended":[65],"timeframes,":[66],"making":[67],"it":[68],"difficult":[69],"know":[71],"how":[72],"well":[73],"these":[74],"truly":[76],"help":[77],"users":[78,133],"recover":[79],"their":[80],"accounts.":[81],"We":[82,98,130],"also":[83],"lack":[84],"meaningful":[85],"comparisons":[86],"schemes":[88],"as":[89],"most":[90,124],"prior":[91],"work":[92],"examined":[93],"two":[94],"mechanisms":[95,140],"at":[96],"most.":[97],"report":[99],"results":[101],"a":[103,118],"long-term":[104],"user":[105],"study":[106],"usability":[109],"fallback":[111,127],"18":[114],"provide":[117],"fair":[119],"comparison":[120],"four":[123],"commonly":[125],"used":[126],"methods.":[129],"show":[131],"prefer":[134],"SMS-based":[137],"methods,":[138],"while":[139],"based":[141],"on":[142],"PKQs":[143],"trustees":[145],"lag":[146],"regarding":[147],"successful":[148],"resets":[149],"convenience.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
