Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

Offline dictionary attack on password authentication schemes using smart cards

D Wang, P Wang - … Security: 16th International Conference, ISC 2013 …, 2015 - Springer
The design of secure and efficient smart-card-based password authentication schemes
remains a challenging problem today despite two decades of intensive research in the …

A comparative usability study of two-factor authentication

E De Cristofaro, H Du, J Freudiger, G Norcie - arXiv preprint arXiv …, 2013 - arxiv.org
Two-factor authentication (2F) aims to enhance resilience of password-based authentication
by requiring users to provide an additional authentication factor, eg, a code generated by a …

Two-factor mutual authentication based on smart cards and passwords

G Yang, DS Wong, H Wang, X Deng - Journal of computer and system …, 2008 - Elsevier
One of the most commonly used two-factor user authentication mechanisms nowadays is
based on smart-card and password. A scheme of this type is called a smart-card-based …

Understanding security failures of multi-factor authentication schemes for multi-server environments

D Wang, X Zhang, Z Zhang, P Wang - Computers & Security, 2020 - Elsevier
Revealing the security flaws of existing cryptographic protocols is the key to understanding
how to achieve better security. Dozens of multi-factor authentication schemes for multi …

Two-factor authentication: is the world ready? Quantifying 2FA adoption

T Petsas, G Tsirantonakis, E Athanasopoulos… - Proceedings of the …, 2015 - dl.acm.org
As text-based passwords continue to be the dominant form for user identification today,
services try to protect their costumers by offering enhanced, and more secure, technologies …

Authentication schemes and methods: A systematic literature review

I Velásquez, A Caro, A Rodríguez - Information and Software Technology, 2018 - Elsevier
Context There is a great variety of techniques for performing authentication, like the use of
text passwords or smart cards. Some techniques combine others into one, which is known …

A usability study of five {two-factor} authentication methods

K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …

Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity

D Wang, N Wang, P Wang, S Qing - Information Sciences, 2015 - Elsevier
Due to its simplicity, portability and robustness, two-factor authentication has received much
interest in the past two decades. While security-related issues have been well studied, how …