A usability study of five {two-factor} authentication methods

K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …

Soft multi-factor authentication

S Bezzateev, S Fomicheva - 2020 Wave Electronics and its …, 2020 - ieeexplore.ieee.org
Soft Multi-Factor Authentication Page 1 Soft Multi-Factor Authentication S. Bezzateev,
Member, IEEE Saint-Petersburg State University of Aerospace Instrumentation Saint …

Selecting a two-factor authentication system

D de Borde - Network Security, 2007 - Elsevier
Anyone introducing a secure authentication system beyond basic user name and password
authentication faces a variety of choices. Failing to consider all the needs of the …

A lightweight and user-centric two-factor authentication mechanism for iot based on blockchain and smart contract

M Abubakar, Z Jaroucheh… - 2022 2nd International …, 2022 - ieeexplore.ieee.org
Two-factor authentication (2FA) is commonly used in Internet of Things (IoT) authentication
to provide multi-layer protection. Tokens, often known as One-Time Passwords (OTP), are …

Trusted digital identities for mobile devices

PR Carnley, P Rowland, D Bishop… - 2020 IEEE Intl Conf …, 2020 - ieeexplore.ieee.org
The pace of usage of personal devices has increased within industry, driving demand for
trusted digital identities. As the world becomes increasingly mobile with the number of …

[引用][C] Two-factor or not two-factor? A comparative usability study of two-factor authentication

ED Cristofaro, H Du, J Freudiger, G Norcie - Computing Research Repository, 2013

Efficient and flexible multi-factor authentication protocol based on fuzzy extractor of administrator's fingerprint and smart mobile device

AJ Mohammed, AA Yassin - Cryptography, 2019 - mdpi.com
In an era of tremendous development in information technology and the Internet of Things
(IoT), security plays a key role in safety devices connected with the Internet. Authentication is …

Assessing and improving authentication confidence management

M Pearce, S Zeadally, R Hunt - Information Management & Computer …, 2010 - emerald.com
Purpose–The purpose of this paper is to address some weaknesses in the handling of
current multi‐factor authentication, suggests some criteria for overcoming these weaknesses …

Data security and multi-factor authentication: Analysis of requirements under EU law and in selected EU Member States

E Kennedy, C Millard - Computer Law & Security Review, 2016 - Elsevier
Ensuring the security of personal data, particularly in terms of access controls, is becoming
progressively more challenging. The most widely deployed authentication method, a user …

A review of user authentication model for online banking system based on mobile IMEI number

WA Hammood, R Abdullah… - IOP Conference …, 2020 - iopscience.iop.org
The traditional banking system, such as transactions over the counter using bank book is
enhanced by adding the elements of electronic banking, where nowadays all transaction …