ZITA: zero-interaction two-factor authentication using contact traces and in-band proximity verification

N Ghose, K Gupta, L Lazos, M Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Two-factor authentication provides an additional layer of protection to commonly-occurring
password breaches. However, existing TFA methods, often involve special hardware …

Two-factor authentication: is the world ready? Quantifying 2FA adoption

T Petsas, G Tsirantonakis, E Athanasopoulos… - Proceedings of the …, 2015 - dl.acm.org
As text-based passwords continue to be the dominant form for user identification today,
services try to protect their costumers by offering enhanced, and more secure, technologies …

Emulating U2F authenticator devices

F Reimair, C Kollmann… - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
Password authentication has been made more secure by adding additional factors.
Unfortunately, popular two-factor authentication methods are vulnerable to attacks …

Typing-proof: Usable, secure and low-cost two-factor authentication based on keystroke timings

X Liu, Y Li, RH Deng - Proceedings of the 34th Annual Computer …, 2018 - dl.acm.org
Two-factor authentication (2FA) systems provide another layer of protection to users'
accounts beyond password. Traditional hardware token based 2FA and software token …

[PDF][PDF] Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.

M Shirvanian, S Jarecki, N Saxena, N Nathan - NDSS, 2014 - researchgate.net
Two-factor authentication (TFA), enabled by hardware tokens and personal devices, is
gaining momentum. The security of TFA schemes relies upon a human-memorable …

Don't punish all of us: measuring user attitudes about two-factor authentication

J Dutson, D Allen, D Eggett… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Two-factor authentication (2FA) defends against password compromise by a remote
attacker. We surveyed 4,275 students, faculty, and staff at Brigham Young University to …

A comparative usability study of two-factor authentication

E De Cristofaro, H Du, J Freudiger, G Norcie - arXiv preprint arXiv …, 2013 - arxiv.org
Two-factor authentication (2F) aims to enhance resilience of password-based authentication
by requiring users to provide an additional authentication factor, eg, a code generated by a …

TrustOTP: Transforming smartphones into secure one-time password tokens

H Sun, K Sun, Y Wang, J Jing - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Two-factor authentication has been widely used due to the vulnerabilities associated with
traditional text-based password. One-time password (OTP) plays an indispensable role on …

2D-2FA: A new dimension in two-factor authentication

M Shirvanian, S Agrawal - Proceedings of the 37th Annual Computer …, 2021 - dl.acm.org
We propose a two-factor authentication (2FA) mechanism called 2D-2FA to address security
and usability issues in existing methods. 2D-2FA has three distinguishing features: First …

SMS OTP security (SOS) hardening SMS-based two factor authentication

C Peeters, C Patton, INS Munyaka… - Proceedings of the …, 2022 - dl.acm.org
SMS-based two-factor authentication (2FA) is the most widely deployed 2FA mechanism,
despite the fact that SMS messages are known to be vulnerable to rerouting attacks, and …