Human-centered authentication guidelines

JD Still, A Cain, D Schuster - Information & Computer Security, 2017 - emerald.com
Purpose Despite the widespread use of authentication schemes and the rapid emergence of
novel authentication schemes, a general set of domain-specific guidelines has not yet been …

[PDF][PDF] Human-centered authentication guidelines

JD Still, A Cain, D Schuster - scholar.archive.org
Over the last few years, cybersecurity has, unfortunately, taken center stage as cyber-attacks
have become a common occurrence. On a regular basis, we learn of another cyber-attack …

Human-centered authentication guidelines

J Still, A Cain, D Schuster - Information and Computer …, 2017 - scholarworks.sjsu.edu
PurposeDespite the widespread use of authentication schemes and the rapid emergence of
novel authentication schemes, a general set of domain-specific guidelines has not yet been …

[PDF][PDF] Human-centered authentication guidelines

J Still, A Cain, D Schuster - 2017 - scholarworks.sjsu.edu
Over the last few years, cybersecurity has, unfortunately, taken center stage as cyber-attacks
have become a common occurrence. On a regular basis, we learn of another cyber-attack …