SG Lyastani, M Schilling, M Neumayr… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The newest contender for succeeding passwords as the incumbent web authentication scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …
Low-power microcontrollers lack some of the hardware features and memory resources that enable multiprogrammable systems. Accordingly, microcontroller-based operating systems …
S Das, A Dingman, LJ Camp - … Nieuwpoort, Curaçao, February 26–March 2 …, 2018 - Springer
Why do individuals choose to use (or not use) Two Factor Authentication (2FA)? We sought to answer this by implementing a two-phase study of the Yubico Security Key. We analyzed …
R Majumdar, S Das - Proceedings of the Workshop on Usable …, 2021 - papers.ssrn.com
Quantum computers are considered a blessing to the dynamic technological world that promises to solve complex problems much faster than their known classical counterparts …
S Gadde, GS Rao, VS Veesam… - … des Systèmes d' …, 2023 - search.ebscohost.com
Cloud computing has emerged as a pivotal trend across both commercial and academic sectors, offering substantial storage capabilities to service providers and end-users …
J Reynolds, T Smith, K Reese… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Two-factor authentication (2FA) significantly improves the security of password-based authentication. Recently, there has been increased interest in Universal 2nd Factor (U2F) …
K Marky, K Ragozin, G Chernyshov… - ACM transactions on …, 2022 - dl.acm.org
Two-factor authentication (2FA) is a recommended or imposed authentication mechanism for valuable online assets. However, 2FA mechanisms usually exhibit user experience …
The goal of the FIDO2 project is to provide secure and usable alternatives to password- based authentication on the Web. It relies on public-key credentials, which a user can …
J Reynolds, N Samarin, J Barnes, T Judd… - 29th USENIX Security …, 2020 - usenix.org
Two-Factor Authentication (2FA) hardens an organization against user account compromise, but adds an extra step to organizations' mission-critical tasks. We investigate to what extent …