This document introduces the concept of challenge/response authentication, where users are authenticated by answering a series of personal questions. It then describes a number of best practices for robust, usable deployment of challenge/response authentication techniques.
Access to this document requires registration. Please fill in the form below. The full document will be emailed to you automatically.