Non-inclusive online security: older adults' experience with two-factor authentication

S Das, A Kim, B Jelen, L Huber… - Proceedings of the 54th …, 2020 - papers.ssrn.com
Older adults access critical resources online, including bank, retirement, and health
insurance accounts. Thus, it is necessary to protect their accounts so they can confidently …

“It's Just a Lot of Prerequisites”: A User Perception and Usability Analysis of the German ID Card as a FIDO2 Authenticator

M Keil, P Markert, M Dürmuth - … of the 2022 European Symposium on …, 2022 - dl.acm.org
Two-factor authentication (2FA) overcomes the insecurity of passwords by adding a second
factor to the authentication process. A variant of 2FA, which is even phishing-resistant unlike …

Poster: User Awareness of Phishing and WebAuthn

M Tran, S Amft, D Wermke - In 43rd IEEE Symposium on Security and …, 2022 - teamusec.de
Abstract Two-factor authentication (2FA) adds an additional layer of security to password-
based authentication. SMS and software-based 2FA methods are the most commonly …

Tangible {2FA}–An {In-the-Wild} Investigation of {User-Defined} Tangibles for {Two-Factor} Authentication

M Turner, M Schmitz, MM Bierey, M Khamis… - … Symposium on Usable …, 2023 - usenix.org
Although two-factor authentication (2FA) mechanisms can be usable, they poorly integrate
into users' daily routines, especially during mobile use. Using tangibles for 2FA is a …

A Study of {Multi-Factor} and {Risk-Based} Authentication Availability

A Gavazzi, R Williams, E Kirda, L Lu, A King… - 32nd USENIX Security …, 2023 - usenix.org
Password-based authentication (PBA) remains the most popular form of user authentication
on the web despite its long-understood insecurity. Given the deficiencies of PBA, many …

User perceptions of security and usability of mobile-based single password authentication and two-factor authentication

D İşler, A Küpçü, A Coskun - … International Workshops, DPM 2019 and CBT …, 2019 - Springer
Two-factor authentication provides a significant improvement over the security of traditional
password-based authentication by requiring users to provide an additional authentication …

2D-2FA: A new dimension in two-factor authentication

M Shirvanian, S Agrawal - Proceedings of the 37th Annual Computer …, 2021 - dl.acm.org
We propose a two-factor authentication (2FA) mechanism called 2D-2FA to address security
and usability issues in existing methods. 2D-2FA has three distinguishing features: First …

Implementing Biometric or Graphical Password Authentication in a Universal Three-Factor Authentication System

MN Hossain, SFU Zaman, TZ Khan… - … and the Internet …, 2022 - ieeexplore.ieee.org
There are three critical aspects of cyber security: authentication, safety, and secrecy.
Consumers have access to a wide range of alternatives for improving the safety of password …

Why Johnny doesn't use two factor a two-phase usability study of the FIDO U2F security key

S Das, A Dingman, LJ Camp - … Nieuwpoort, Curaçao, February 26–March 2 …, 2018 - Springer
Why do individuals choose to use (or not use) Two Factor Authentication (2FA)? We sought
to answer this by implementing a two-phase study of the Yubico Security Key. We analyzed …

[PDF][PDF] A case study in selection and deployment of a multi-factor authentication solution.

EC Donald, MA Bumpus… - Issues in Information …, 2021 - pdfs.semanticscholar.org
Adapting to an increasing cybersecurity threat is an ongoing challenge for all organizations,
with the 2020 global pandemic of COVID-19 introducing additional variables into the …