[HTML][HTML] Stakeholder perspectives and requirements on cybersecurity in Europe

S Fischer-Hübner, C Alcaraz, A Ferreira… - Journal of information …, 2021 - Elsevier
This article presents an overview and analysis of the key cybersecurity problems, challenges
and requirements to be addressed in the future, which we derived through 63 interviews with …

Driving {2FA} adoption at scale: Optimizing {Two-Factor} authentication notification design patterns

M Golla, G Ho, M Lohmus, M Pulluri… - 30th USENIX Security …, 2021 - usenix.org
Two-factor authentication (2FA) is one of the primary mechanisms for defending end-user
accounts against phishing and password reuse attacks. Unfortunately, getting users to adopt …

[PDF][PDF] “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication

JH Klemmer, M Gutfleisch, C Stransky, Y Acar… - 2023 - saschafahl.de
Password-based authentication is the status quo on the web and beyond [6, 13, 14]—
despite its many known problems. This includes challenges around memorizing passwords …

They would do better if they worked together: The case of interaction problems between password managers and websites

N Huaman, S Amft, M Oltrogge… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Password managers are tools to support users with the secure generation and storage of
credentials and logins used in online accounts. Previous work illustrated that building …

Is real-time phishing eliminated with {FIDO}? social engineering downgrade attacks against {FIDO} protocols

E Ulqinaku, H Assal, AR Abdou, S Chiasson… - 30th USENIX Security …, 2021 - usenix.org
FIDO's U2F is a web-authentication mechanism designed to mitigate real-time phishing—an
attack that undermines multi-factor authentication by allowing an attacker to relay second …

" If I could do this, I feel anyone {could:}" The Design and Evaluation of a Secondary Authentication Factor Manager

G Smith, T Yadav, J Dutson, S Ruoti… - 32nd USENIX Security …, 2023 - usenix.org
Two-factor authentication (2FA) defends against account compromise by protecting an
account with both a password—the primary authentication factor—and a device or resource …

" We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments

S Amft, S Höltervennhoff, N Huaman, A Krause… - Proceedings of the …, 2023 - dl.acm.org
Multi-Factor Authentication is intended to strengthen the security of password-based
authentication by adding another factor, such as hardware tokens or one-time passwords …

A systematic study of the consistency of two-factor authentication user journeys on top-ranked websites

S Ghorbani Lyastani, S Bugiel, M Backes - 2023 - publications.cispa.de
Heuristics for user experience state that users will transfer their expectations from one
product to another. A lack of consistency between products can increase users' cognitive …

Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction

A Kruzikova, M Muzik, L Knapova, L Dedkova… - Computers & …, 2024 - Elsevier
Usability is a crucial aspect that increases the willingness to adopt more demanding two-
factor authentication (2FA) methods. There is little knowledge about the role of efficiency (ie …

A novel two-factor honeytoken authentication mechanism

V Papaspirou, L Maglaras, MA Ferrag… - 2021 International …, 2021 - ieeexplore.ieee.org
The majority of systems rely on user authentication on passwords, but passwords have so
many weaknesses and widespread use that easily raise significant security concerns …