2FA might be secure, but it's not usable: A summative usability assessment of Google's two-factor authentication (2FA) methods

CZ Acemyan, P Kortum, J Xiong… - Proceedings of the …, 2018 - journals.sagepub.com
Computer security experts recommend that people use two-factor authentication (2FA) on
password protected systems to help keep hackers out. Providing two pieces of information to …

A comparative usability study of two-factor authentication

E De Cristofaro, H Du, J Freudiger, G Norcie - arXiv preprint arXiv …, 2013 - arxiv.org
Two-factor authentication (2F) aims to enhance resilience of password-based authentication
by requiring users to provide an additional authentication factor, eg, a code generated by a …

Two-factor authentication: is the world ready? Quantifying 2FA adoption

T Petsas, G Tsirantonakis, E Athanasopoulos… - Proceedings of the …, 2015 - dl.acm.org
As text-based passwords continue to be the dominant form for user identification today,
services try to protect their costumers by offering enhanced, and more secure, technologies …

A usability study of five {two-factor} authentication methods

K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …

How mandatory second factor affects the authentication user experience

J Abbott, S Patil - Proceedings of the 2020 CHI Conference on Human …, 2020 - dl.acm.org
Recent years have seen growing organizational adoption of two-factor authentication as
organizations seek to limit the damage caused by password breaches. However, research …

Don't punish all of us: measuring user attitudes about two-factor authentication

J Dutson, D Allen, D Eggett… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Two-factor authentication (2FA) defends against password compromise by a remote
attacker. We surveyed 4,275 students, faculty, and staff at Brigham Young University to …

"They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking

K Krol, E Philippou, E De Cristofaro… - arXiv preprint arXiv …, 2015 - arxiv.org
To prevent password breaches and guessing attacks, banks increasingly turn to two-factor
authentication (2FA), requiring users to present at least one more factor, such as a one-time …

" We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments

S Amft, S Höltervennhoff, N Huaman, A Krause… - Proceedings of the …, 2023 - dl.acm.org
Multi-Factor Authentication is intended to strengthen the security of password-based
authentication by adding another factor, such as hardware tokens or one-time passwords …

[PDF][PDF] The state of user authentication in the wild

N Quermann, M Harbach, M Dürmuth - WAY, 2018 - wayworkshop.org
User authentication is a field under active research, both from the academic community,
startups, and established companies. In this context, passwords are regularly declared …

“It's not actually that horrible” Exploring Adoption of Two-Factor Authentication at a University

J Colnago, S Devlin, M Oates, C Swoopes… - Proceedings of the …, 2018 - dl.acm.org
Despite the additional protection it affords, two-factor authentication (2FA) adoption
reportedly remains low. To better understand 2FA adoption and its barriers, we observed the …