[PDF][PDF] What does “MFA” mean?

J Goldberg - … of the International Conference Workshop Who …, 2018 - blog.1password.com
Multi-factor authentication (MFA) is widely recommended as a measure to improve security.
Yet the security that it provides varies dramatically from system to system …

Effects of human cognitive differences on interaction and visual behavior in graphical user authentication

M Belk, C Fidas, C Katsini, N Avouris… - … –INTERACT 2017: 16th …, 2017 - Springer
This paper discusses two user studies to investigate whether human cognitive differences
affect user interaction and visual behavior within recognition-based graphical authentication …

" Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA

E Al Qahtani, L Sahoo, Y Javed, M Shehab - Proceedings of the 27th …, 2022 - dl.acm.org
The voluntary adoption rate of two-factor authentication (2FA) remains low. This paper
investigates whether video-based risk communication messages about Duo 2FA impacts …

[PDF][PDF] Intelligent two-factor authentication–Deciding authentication requirements using historical context data

O Jarva - 2014 - aaltodoc.aalto.fi
This thesis is a case study of designing and implementing a more secure authentication
service for Futurice Ltd., which is a medium-sized software consulting company. Majority of …

The relationship between usability and biometric authentication in mobile phones

CG Allen, S Komandur - HCI International 2019-Posters: 21st International …, 2019 - Springer
It is estimated that over 1 billion people are active mobile phone users in 2018. When using
a mobile phone, there are a variety of ways to authenticate and “secure” the device, and …

Sequence based two-factor authentication (2fa) method

D Amin, Y Albayram - HCI International 2020–Late Breaking Posters: 22nd …, 2020 - Springer
Abstract Two-factor authentication (2FA) provides an extra layer of security by combining two
different authentication factors that are unrelated (eg, password and an authentication code …

A Comprehensive Analysis on using Multifactor Authentication System for Three Level Security

R Kantipudi, ASK Mallavarapu… - … on Intelligent Data …, 2024 - ieeexplore.ieee.org
In the era of digitalization, authentication is a vital part of modern society's security. Multi-
factor authentication (MFA) is a vital solution that offers fast, simple, and trustworthy …

[图书][B] User perceptions of security risks in multiple authentications

H Saint-Louis - 2018 - search.proquest.com
Authentication is an everyday practice in the information economy. When people use
Facebook, Google, or Twitter to log in a third-party app they perform tertiary authentications …

The interplay between humans, technology and user authentication: A cognitive processing perspective

M Belk, C Fidas, P Germanakos, G Samaras - Computers in Human …, 2017 - Elsevier
This paper investigates the interplay among human cognitive processing differences (field
dependence vs. field independence), alternative interaction device types (desktop vs. touch) …

Challenges with passwordless FIDO2 in an enterprise setting: A usability study

M Kepkowski, M Machulak, I Wood… - 2023 IEEE Secure …, 2023 - ieeexplore.ieee.org
Fast Identity Online 2 (FIDO2), a modern authentication protocol, is gaining popularity as a
default strong authentication mechanism. It has been recognized as a leading candidate to …