The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …

“Nah, it's just annoying!” A Deep Dive into User Perceptions of Two-Factor Authentication

K Marky, K Ragozin, G Chernyshov… - ACM transactions on …, 2022 - dl.acm.org
Two-factor authentication (2FA) is a recommended or imposed authentication mechanism
for valuable online assets. However, 2FA mechanisms usually exhibit user experience …

Asynchronous Authentication

M Mouallem, I Eyal - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
A myriad of authentication mechanisms embody a continuous evolution from verbal
passwords in ancient times to contemporary multi-factor authentication: Cryptocurrency …

Current topics of interdisciplinary cooperation between engineering and human sciences

A Dressler, N Gerber, A Menig, O Pasnicu… - Zeitschrift für …, 2023 - Springer
In this article, we highlight current research directions in the Technikpsychologie research
area, using the example of the interdisciplinary research work of FAI (Work and Engineering …

Framework for the Comparison and Selection of Schemes for Multi-Factor Authentication

I Velásquez - Clei Electronic Journal, 2021 - clei.org
Authentication is the process of verifying a user's identity for them to access a system's
resources. An authentication factor is a piece of information used for this authentication …

From the quest to replace passwords towards supporting secure and usable password creation

V Zimmermann - 2021 - tuprints.ulb.tu-darmstadt.de
Authentication is an important measure for protecting personal and sensitive information
from unauthorised access. Password authentication still is the most widely used form of …

[PDF][PDF] Privacy-Sovereign Interaction: Enabling Privacy-Sovereignty for End-Users in the Digital Era

K Marky - 2021 - tuprints.ulb.tu-darmstadt.de
As a result of the ongoing digitization, people are increasingly interacting with digital data.
Since these data can contain sensitive personal information, the privacy of users plays a …

Privacy-Sovereign Interaction

K Marky - Ausgezeichnete Informatikdissertationen 2020, 2021 - dl.gi.de
Durch die stetig fortschreitende Digitalisierung interagieren Menschen zunehmend mit
Daten im digitalen Raum, die von (mobilen) Endgeräten generiert und auf (Cloud-) Servern …