A usability study of five {two-factor} authentication methods

K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …

Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication

SG Lyastani, M Schilling, M Neumayr… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The newest contender for succeeding passwords as the incumbent web authentication
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …

Multiprogramming a 64kb computer safely and efficiently

A Levy, B Campbell, B Ghena, DB Giffin… - Proceedings of the 26th …, 2017 - dl.acm.org
Low-power microcontrollers lack some of the hardware features and memory resources that
enable multiprogrammable systems. Accordingly, microcontroller-based operating systems …

Why Johnny doesn't use two factor a two-phase usability study of the FIDO U2F security key

S Das, A Dingman, LJ Camp - … Nieuwpoort, Curaçao, February 26–March 2 …, 2018 - Springer
Why do individuals choose to use (or not use) Two Factor Authentication (2FA)? We sought
to answer this by implementing a two-phase study of the Yubico Security Key. We analyzed …

Sok: An evaluation of quantum authentication through systematic literature review

R Majumdar, S Das - Proceedings of the Workshop on Usable …, 2021 - papers.ssrn.com
Quantum computers are considered a blessing to the dynamic technological world that
promises to solve complex problems much faster than their known classical counterparts …

Secure Data Sharing in Cloud Computing: A Comprehensive Survey of Two-Factor Authentication and Cryptographic Solutions.

S Gadde, GS Rao, VS Veesam… - … des Systèmes d' …, 2023 - search.ebscohost.com
Cloud computing has emerged as a pivotal trend across both commercial and academic
sectors, offering substantial storage capabilities to service providers and end-users …

A tale of two studies: The best and worst of yubikey usability

J Reynolds, T Smith, K Reese… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Two-factor authentication (2FA) significantly improves the security of password-based
authentication. Recently, there has been increased interest in Universal 2nd Factor (U2F) …

“Nah, it's just annoying!” A Deep Dive into User Perceptions of Two-Factor Authentication

K Marky, K Ragozin, G Chernyshov… - ACM transactions on …, 2022 - dl.acm.org
Two-factor authentication (2FA) is a recommended or imposed authentication mechanism
for valuable online assets. However, 2FA mechanisms usually exhibit user experience …

{“You} still use the password after {all”}–Exploring {FIDO2} Security Keys in a Small Company

FM Farke, L Lorenz, T Schnitzler, P Markert… - … Symposium on Usable …, 2020 - usenix.org
The goal of the FIDO2 project is to provide secure and usable alternatives to password-
based authentication on the Web. It relies on public-key credentials, which a user can …

Empirical Measurement of Systemic {2FA} Usability

J Reynolds, N Samarin, J Barnes, T Judd… - 29th USENIX Security …, 2020 - usenix.org
Two-Factor Authentication (2FA) hardens an organization against user account compromise,
but adds an extra step to organizations' mission-critical tasks. We investigate to what extent …