CZ Acemyan, P Kortum, J Xiong… - Proceedings of the …, 2018 - journals.sagepub.com
Computer security experts recommend that people use two-factor authentication (2FA) on password protected systems to help keep hackers out. Providing two pieces of information to …
S Pandey, T Taffese - … of the Human Factors and Ergonomics …, 2021 - journals.sagepub.com
Low user adoption due to usability issues during setup is one of the primary challenges facing two-factor authentication implementations. A method which could quickly provide …
Despite the additional protection it affords, two-factor authentication (2FA) adoption reportedly remains low. To better understand 2FA adoption and its barriers, we observed the …
K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured with 2FA typically requires an individual to authenticate using something they know …
K Marky, K Ragozin, G Chernyshov… - ACM transactions on …, 2022 - dl.acm.org
Two-factor authentication (2FA) is a recommended or imposed authentication mechanism for valuable online assets. However, 2FA mechanisms usually exhibit user experience …
J Abbott, S Patil - Proceedings of the 2020 CHI Conference on Human …, 2020 - dl.acm.org
Recent years have seen growing organizational adoption of two-factor authentication as organizations seek to limit the damage caused by password breaches. However, research …
Abstract Two-factor authentication (2FA) provides effective protection for online accounts by providing efficient and highly robust access control. Adoption and usability, however, remain …
J Reynolds, N Samarin, J Barnes, T Judd… - 29th USENIX Security …, 2020 - usenix.org
Two-Factor Authentication (2FA) hardens an organization against user account compromise, but adds an extra step to organizations' mission-critical tasks. We investigate to what extent …
Usability is a crucial aspect that increases the willingness to adopt more demanding two- factor authentication (2FA) methods. There is little knowledge about the role of efficiency (ie …