Exploring user authentication with windows hello in a small business environment

FM Farke, L Lassak, J Pinter, M Dürmuth - Eighteenth Symposium on …, 2022 - usenix.org
Windows Hello for Business is Microsoft's latest attempt to replace passwords in Windows
enterprise environments introduced with Windows 10. It addresses some of the common …

On-demand biometrics: Fast cross-device authentication

C Holz, FR Bentley - Proceedings of the 2016 CHI Conference on …, 2016 - dl.acm.org
We explore the use of a new way to log into a web service, such as email or social media.
Using on-demand biometrics, users sign in from a browser on a computer using just their …

Attacking Windows Hello for Business: Is It What We Were Promised?

J Haddad, N Pitropakis, C Chrysoulas, M Lemoudden… - Cryptography, 2023 - mdpi.com
Traditional password authentication methods have raised many issues in the past, including
insecure practices, so it comes as no surprise that the evolution of authentication should …

" It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users' Misconceptions About {FIDO2} Biometric {WebAuthn}

L Lassak, A Hildebrandt, M Golla, B Ur - 30th USENIX Security …, 2021 - usenix.org
While prior attempts at passwordless authentication on the web have required specialized
hardware, FIDO2's WebAuthn protocol lets users sign into websites with their smartphone …

Knock x knock: the design and evaluation of a unified authentication management system

E Hayashi, JI Hong - Proceedings of the 2015 ACM International Joint …, 2015 - dl.acm.org
We introduce UniAuth, a set of mechanisms for streamlining authentication to devices and
web services. With UniAuth, a user first authenticates himself to his UniAuth client, typically …

[PDF][PDF] Toward reliable user authentication through biometrics

V Matyas, Z Riha - IEEE Security & Privacy, 2003 - Citeseer
Acquiring samples. During a user's first contact with the biometric system, the system collects
a biometric sample using an input device. The quality of the first sample is crucial …

Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables

P Shrestha, N Saxena - Proceedings of the 13th ACM Conference on …, 2020 - dl.acm.org
The currently deployed web authentication model, involving only entry-point authentication
of users, does not do anything to protect against account takeover attacks. Once the attacker …

[PDF][PDF] Poster: Usability analysis of biometric authentication systems on mobile phones

K Iacovino, SM Kywe, LF Cranor… - Proc. 10th Symp. Usable …, 2014 - cups.cs.cmu.edu
Despite decades of research into biometric authentication, few such systems have been
deployed widely. Recently, however, popular smartphone platforms have offered average …

Typing biometric keypads: Combining keystroke time and pressure features to improve authentication

B Ngugi, P Tarasewich, M Recce - Journal of Organizational and …, 2012 - igi-global.com
Pervasive online applications are changing the way people perform routine activities. But
while providing convenience to individuals and organizations, these applications can pose a …

{“You} still use the password after {all”}–Exploring {FIDO2} Security Keys in a Small Company

FM Farke, L Lorenz, T Schnitzler, P Markert… - … Symposium on Usable …, 2020 - usenix.org
The goal of the FIDO2 project is to provide secure and usable alternatives to password-
based authentication on the Web. It relies on public-key credentials, which a user can …