[PDF][PDF] The CIA strikes back: Redefining confidentiality, integrity and availability in security.

S Samonas, D Coss - Journal of Information System Security, 2014 - proso.com
This paper reviews the history of the CIA (Confidentiality, Integrity and Availability) triad from
the perspectives of information security practitioners and scholars. Whilst the former have …

A usability study of five {two-factor} authentication methods

K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …

Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication

SG Lyastani, M Schilling, M Neumayr… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The newest contender for succeeding passwords as the incumbent web authentication
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …

{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound

N Karapanos, C Marforio, C Soriente… - 24th USENIX security …, 2015 - usenix.org
Two-factor authentication protects online accounts even if passwords are leaked. Most
users, however, prefer password-only authentication. One reason why twofactor …

“It's not actually that horrible” Exploring Adoption of Two-Factor Authentication at a University

J Colnago, S Devlin, M Oates, C Swoopes… - Proceedings of the …, 2018 - dl.acm.org
Despite the additional protection it affords, two-factor authentication (2FA) adoption
reportedly remains low. To better understand 2FA adoption and its barriers, we observed the …

[图书][B] Usable security: History, themes, and challenges

S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …

A survey of authentication schemes in telecare medicine information systems

MU Aslam, A Derhab, K Saleem, H Abbas… - Journal of medical …, 2017 - Springer
E-Healthcare is an emerging field that provides mobility to its users. The protected health
information of the users are stored at a remote server (Telecare Medical Information System) …

User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking

N Gunson, D Marshall, H Morton, M Jack - Computers & Security, 2011 - Elsevier
This paper describes an experiment to investigate user perceptions of the usability and
security of single-factor and two-factor authentication methods in automated telephone …

Why do they do what they do?: A study of what motivates users to (not) follow computer security advice

M Fagan, MMH Khan - Twelfth symposium on usable privacy and …, 2016 - usenix.org
Usable security researchers have long been interested in what users do to keep their
devices and data safe and how that compares to recommendations. Additionally, experts …

The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …