A usability study of five {two-factor} authentication methods

K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …

[PDF][PDF] A Usability Study of Five Two-Factor Authentication Methods

K Reese, T Smith, J Dutson, J Armknecht, J Cameron… - usenix.net
Abstract Two-factor authentication (2FA) defends against account compromise. An account
secured with 2FA typically requires an individual to authenticate using something they know …

[PDF][PDF] A Usability Study of Five Two-Factor Authentication Methods

K Reese, T Smith, J Dutson, J Armknecht, J Cameron… - scholar.archive.org
Abstract Two-factor authentication (2FA) defends against account compromise. An account
secured with 2FA typically requires an individual to authenticate using something they know …

A Usability Study of Five Two-Factor Authentication Methods

K Reese, T Smith, J Dutson, J Armknecht… - Proceedings of the …, 2019 - par.nsf.gov
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …

A Usability Study of Five Two-Factor Authentication Methods

K Reese, T Smith, J Dutson, J Armknecht, J Cameron… - usenix.org
A Usability Study of Five Two-Factor Authentication Methods Page 1 Ken Reese, Trevor Smith,
Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons A Usability Study of …

[PDF][PDF] A Usability Study of Five Two-Factor Authentication Methods

K Reese, T Smith, J Dutson, J Armknecht, J Cameron… - m.ezisraelc.com
Abstract Two-factor authentication (2FA) defends against account compromise. An account
secured with 2FA typically requires an individual to authenticate using something they know …

A usability study of five two-factor authentication methods

K Reese, T Smith, J Dutson, J Armknecht… - Proceedings of the …, 2019 - dl.acm.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …

A Usability Study of Five Two-Factor Authentication Methods

K Reese, T Smith, J Dutson, J Armknecht, J Cameron… - pdfs.semanticscholar.org
A Usability Study of Five Two-Factor Authentication Methods Page 1 Ken Reese, Trevor Smith,
Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons A Usability Study of …

A Usability Study of Five Two-Factor Authentication Methods

K Reese, T Smith, J Dutson, J Armknecht, J Cameron… - usenix.net
A Usability Study of Five Two-Factor Authentication Methods Page 1 Ken Reese, Trevor Smith,
Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons A Usability Study of …

A Usability Study of Five Two-Factor Authentication Methods

K Reese, T Smith, J Dutson, J Armknecht, J Cameron… - m.ezisraelc.com
A Usability Study of Five Two-Factor Authentication Methods Page 1 Ken Reese, Trevor Smith,
Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons A Usability Study of …