Gathering Realistic Authentication Performance Data Through Field Trials
نویسندگان
چکیده
Most evaluations of novel authentication mechanisms have been conducted under laboratory conditions. We argue that the results of short-term usage under laboratory conditions do not predict user performance “in the wild”, because there is insufficient time between enrolment and testing, the number of authentications is low, and authentication is presented as a primary task, rather then the secondary task as it is “in the wild”. User generated reports of performance on the other hand provide subjective data, so reports on frequency of use, time intervals, and success or failure of authentication are subject to the vagaries of users’ memories. Studies on authentication that provide objective performance data under real-world conditions are rare. In this paper, we present our experiences with a study method that tries to control frequency and timing of authentication, and collects reliable performance data, while maintaining ecological validity of the authentication context at the same time. We describe the development of an authentication server called APET, which allows us to prompt users enrolled in trial cohorts to authenticate at controlled intervals, and report our initial experiences with trials. We conclude by discussing remaining challenges in obtaining reliable performance data through a field trial method such as this one.
منابع مشابه
Experimental Methods of Antiquities Dating
Archaeological researches have been started as an interdisciplinary approach in the field of cultural heritage sciences (especially archaeology as an original field) for more than half a century. It has gathered together the researchers of different fields of human sciences, basic sciences, engineering and art according to their interests in archaeological findings and curiosity in solving huma...
متن کاملUsing perturbed handwriting to support writer identification in the presence of severe data constraints
Since real data is time-consuming and expensive to collect, label, and use, researchers have proposed approaches using synthetic variations for the tasks of signature verification, speaker authentication, handwriting recognition, keyword spotting, etc. However, the limitation of real data is particularly critical in the field of writer identification in that in forensics, enemies or criminals u...
متن کاملThe Security and Performance of the Galois/Counter Mode (GCM) of Operation
The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on multiplication in a binary finite field. We analyze its security and performance, and show that it is the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and e...
متن کاملThe Security and Performance of the Galois/Counter Mode of Operation (Full Version)
The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on multiplication in a binary finite field. We analyze its security and performance, and show that it is the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and e...
متن کاملThe Security and Performance of the Galois/Counter Mode (GCM) of Operation (Full Version)
The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on multiplication in a binary finite field. We analyze its security and performance, and show that it is the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and e...
متن کامل