Evaluating user perception of multi-factor authentication: A systematic review

S Das, B Wang, Z Tingle, LJ Camp - arXiv preprint arXiv:1908.05901, 2019 - arxiv.org
Security vulnerabilities of traditional single factor authentication has become a major
concern for security practitioners and researchers. To mitigate single point failures, new and …

" You've got your nice list of bugs, now what?" vulnerability discovery and management processes in the wild

N Alomar, P Wijesekera, E Qiu, S Egelman - Sixteenth Symposium on …, 2020 - usenix.org
Organizational security teams have begun to specialize, and as a result, the existence of
red, blue, and purple teams have been used as signals for an organization's security …

They would do better if they worked together: The case of interaction problems between password managers and websites

N Huaman, S Amft, M Oltrogge… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Password managers are tools to support users with the secure generation and storage of
credentials and logins used in online accounts. Previous work illustrated that building …

Hybrid password meters for more secure passwords–a comprehensive study of password meters including nudges and password information

V Zimmermann, K Marky, K Renaud - Behaviour & Information …, 2023 - Taylor & Francis
Supporting users with secure password creation is a well-explored yet unresolved research
topic. A promising intervention is the password meter, ie providing feedback on the user's …

“taking out the trash”: Why security behavior change requires intentional forgetting

J Hielscher, A Kluge, U Menges… - Proceedings of the 2021 …, 2021 - dl.acm.org
Security awareness is big business–virtually every organization in the Western world
provides some form of awareness or training, mostly bought from external vendors …

A Systematic Analysis of User Evaluations in Security Research

P Hamm, D Harborth, S Pape - … of the 14th International Conference on …, 2019 - dl.acm.org
We conducted a literature survey on reproducibility and replicability of user surveys in
security research. For that purpose, we examined all papers published over the last five …

SoK: Web Authentication in the Age of End-to-End Encryption

J Blessing, D Hugenroth, RJ Anderson… - arXiv preprint arXiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …

[图书][B] A risk-reduction-based incentivization model for human-centered multi-factor authentication

S Das - 2020 - search.proquest.com
Online user presence has increased rapidly over the last few years, broadening the user
base. With the rise in digital usage, we have also witnessed a rise in digital crimes, which …

[PDF][PDF] User-centric adaptive password policies to combat password fatigue.

Y Al-Slais, WM El-Medany - Int. Arab J. Inf. Technol., 2022 - ccis2k.org
Today, online users will have an average of 25 password-protected accounts online, yet
use, on average, 6.5 passwords. The excessive cognitive burden of remembering large …

BANN-TMGuard: Towards Touch Movement-Based Screen Unlock Patterns via Blockchain-enabled Artificial Neural Networks on IoT Devices

W Meng, W Li, AN Calugar - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) devices such as smartphones have become important to people's
everyday usage, especially the number of smartphone shipment has surpassed six billion …