Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond

dc.contributor.authorKhan, Hassan
dc.contributor.authorCeci, Jason
dc.contributor.authorStegman, Jonah
dc.contributor.authorAviv, Adam J.
dc.contributor.authorDara, Rozita
dc.contributor.authorKuber, Ravi
dc.date.accessioned2021-03-25T17:10:17Z
dc.date.available2021-03-25T17:10:17Z
dc.description.abstractMany mobile and web apps switching to PIN-based authentication as the default option. Many loyalty cards now require PINs. Most keyless home locks use PIN authenticationen_US
dc.format.extent17 pagesen_US
dc.genrepresentations (communicative events)en_US
dc.identifierdoi:10.13016/m2ruev-alwr
dc.identifier.citationHassan Khan, Jason Ceci et al., Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond, https://pdfs.semanticscholar.org/47b5/85417ea3987876ff15827fd92037632adedb.pdfen_US
dc.identifier.urihttp://hdl.handle.net/11603/21214
dc.language.isoen_USen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.titleWidely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyonden_US
dc.typeTexten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
85417ea3987876ff15827fd92037632adedb.pdf
Size:
5.03 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: