A comparative usability study of two-factor authentication

E De Cristofaro, H Du, J Freudiger, G Norcie - arXiv preprint arXiv …, 2013 - arxiv.org
Two-factor authentication (2F) aims to enhance resilience of password-based authentication
by requiring users to provide an additional authentication factor, eg, a code generated by a …

“Nah, it's just annoying!” A Deep Dive into User Perceptions of Two-Factor Authentication

K Marky, K Ragozin, G Chernyshov… - ACM transactions on …, 2022 - dl.acm.org
Two-factor authentication (2FA) is a recommended or imposed authentication mechanism
for valuable online assets. However, 2FA mechanisms usually exhibit user experience …

A usability study of five {two-factor} authentication methods

K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …

2FA might be secure, but it's not usable: A summative usability assessment of Google's two-factor authentication (2FA) methods

CZ Acemyan, P Kortum, J Xiong… - Proceedings of the …, 2018 - journals.sagepub.com
Computer security experts recommend that people use two-factor authentication (2FA) on
password protected systems to help keep hackers out. Providing two pieces of information to …

"They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking

K Krol, E Philippou, E De Cristofaro… - arXiv preprint arXiv …, 2015 - arxiv.org
To prevent password breaches and guessing attacks, banks increasingly turn to two-factor
authentication (2FA), requiring users to present at least one more factor, such as a one-time …

Two-factor authentication: is the world ready? Quantifying 2FA adoption

T Petsas, G Tsirantonakis, E Athanasopoulos… - Proceedings of the …, 2015 - dl.acm.org
As text-based passwords continue to be the dominant form for user identification today,
services try to protect their costumers by offering enhanced, and more secure, technologies …

“It's not actually that horrible” Exploring Adoption of Two-Factor Authentication at a University

J Colnago, S Devlin, M Oates, C Swoopes… - Proceedings of the …, 2018 - dl.acm.org
Despite the additional protection it affords, two-factor authentication (2FA) adoption
reportedly remains low. To better understand 2FA adoption and its barriers, we observed the …

" We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments

S Amft, S Höltervennhoff, N Huaman, A Krause… - Proceedings of the …, 2023 - dl.acm.org
Multi-Factor Authentication is intended to strengthen the security of password-based
authentication by adding another factor, such as hardware tokens or one-time passwords …

Don't punish all of us: measuring user attitudes about two-factor authentication

J Dutson, D Allen, D Eggett… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Two-factor authentication (2FA) defends against password compromise by a remote
attacker. We surveyed 4,275 students, faculty, and staff at Brigham Young University to …

Adventures in recovery land: Testing the account recovery of popular websites when the second factor is lost

E Gerlitz, M Häring, CT Mädler, M Smith… - … Symposium on Usable …, 2023 - usenix.org
Literature on two-factor authentication (2FA) lists users' fear of losing the second factor as
one major constraint on acceptability. Nonetheless, more and more services offer or even …