Two birds with one stone: Two-factor authentication with security beyond conventional bound
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …
authentication has been a subject of intensive research in the past two decades, and …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
Offline dictionary attack on password authentication schemes using smart cards
The design of secure and efficient smart-card-based password authentication schemes
remains a challenging problem today despite two decades of intensive research in the …
remains a challenging problem today despite two decades of intensive research in the …
A comparative usability study of two-factor authentication
Two-factor authentication (2F) aims to enhance resilience of password-based authentication
by requiring users to provide an additional authentication factor, eg, a code generated by a …
by requiring users to provide an additional authentication factor, eg, a code generated by a …
Two-factor mutual authentication based on smart cards and passwords
One of the most commonly used two-factor user authentication mechanisms nowadays is
based on smart-card and password. A scheme of this type is called a smart-card-based …
based on smart-card and password. A scheme of this type is called a smart-card-based …
Understanding security failures of multi-factor authentication schemes for multi-server environments
Revealing the security flaws of existing cryptographic protocols is the key to understanding
how to achieve better security. Dozens of multi-factor authentication schemes for multi …
how to achieve better security. Dozens of multi-factor authentication schemes for multi …
Two-factor authentication: is the world ready? Quantifying 2FA adoption
As text-based passwords continue to be the dominant form for user identification today,
services try to protect their costumers by offering enhanced, and more secure, technologies …
services try to protect their costumers by offering enhanced, and more secure, technologies …
Authentication schemes and methods: A systematic literature review
Context There is a great variety of techniques for performing authentication, like the use of
text passwords or smart cards. Some techniques combine others into one, which is known …
text passwords or smart cards. Some techniques combine others into one, which is known …
A usability study of five {two-factor} authentication methods
K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …
with 2FA typically requires an individual to authenticate using something they know …
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
Due to its simplicity, portability and robustness, two-factor authentication has received much
interest in the past two decades. While security-related issues have been well studied, how …
interest in the past two decades. While security-related issues have been well studied, how …