Multi-factor authentication: A survey
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …
enablers to maintain this process secure is authentication. It covers many different areas of a …
A review of multi-factor authentication in the Internet of Healthcare Things
Objective This review paper aims to evaluate existing solutions in healthcare authentication
and provides an insight into the technologies incorporated in Internet of Healthcare Things …
and provides an insight into the technologies incorporated in Internet of Healthcare Things …
{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound
Two-factor authentication protects online accounts even if passwords are leaked. Most
users, however, prefer password-only authentication. One reason why twofactor …
users, however, prefer password-only authentication. One reason why twofactor …
Driving {2FA} adoption at scale: Optimizing {Two-Factor} authentication notification design patterns
Two-factor authentication (2FA) is one of the primary mechanisms for defending end-user
accounts against phishing and password reuse attacks. Unfortunately, getting users to adopt …
accounts against phishing and password reuse attacks. Unfortunately, getting users to adopt …
Cyberbullying in the metaverse: A prescriptive perception on global information systems for user protection
The emergence of the metaverse, a virtual reality space, has ushered in a new era of digital
experiences and interactions in global information systems. With its unique social norms and …
experiences and interactions in global information systems. With its unique social norms and …
Is this really you? An empirical study on risk-based authentication applied in the wild
Risk-based authentication (RBA) is an adaptive security measure to strengthen password-
based authentication. RBA monitors additional implicit features during password entry such …
based authentication. RBA monitors additional implicit features during password entry such …
Empirical Measurement of Systemic {2FA} Usability
J Reynolds, N Samarin, J Barnes, T Judd… - 29th USENIX Security …, 2020 - usenix.org
Two-Factor Authentication (2FA) hardens an organization against user account compromise,
but adds an extra step to organizations' mission-critical tasks. We investigate to what extent …
but adds an extra step to organizations' mission-critical tasks. We investigate to what extent …
Pump up password security! Evaluating and enhancing risk-based authentication on a real-world large-scale online service
S Wiefling, PR Jørgensen, S Thunem… - ACM Transactions on …, 2022 - dl.acm.org
Risk-based authentication (RBA) aims to protect users against attacks involving stolen
passwords. RBA monitors features during login, and requests re-authentication when …
passwords. RBA monitors features during login, and requests re-authentication when …
" Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication
Usable and secure authentication on the web and beyond is mission-critical. While
password-based authentication is still widespread, users have trouble dealing with …
password-based authentication is still widespread, users have trouble dealing with …
Don't punish all of us: measuring user attitudes about two-factor authentication
J Dutson, D Allen, D Eggett… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Two-factor authentication (2FA) defends against password compromise by a remote
attacker. We surveyed 4,275 students, faculty, and staff at Brigham Young University to …
attacker. We surveyed 4,275 students, faculty, and staff at Brigham Young University to …