[HTML][HTML] User, usage and usability: Redefining human centric cyber security
The effectiveness of cyber security measures are often questioned in the wake of hard hitting
security events. Despite much work being done in the field of cyber security, most of the …
security events. Despite much work being done in the field of cyber security, most of the …
Why older adults (Don't) use password managers
Password managers (PMs) are considered highly effective tools for increasing security, and
a recent study by Pearman et al.(SOUPS'19) highlighted the motivations and barriers to …
a recent study by Pearman et al.(SOUPS'19) highlighted the motivations and barriers to …
They would do better if they worked together: The case of interaction problems between password managers and websites
Password managers are tools to support users with the secure generation and storage of
credentials and logins used in online accounts. Previous work illustrated that building …
credentials and logins used in online accounts. Previous work illustrated that building …
" I'm Literally Just Hoping This Will {Work:'}'Obstacles Blocking the Online Security and Privacy of Users with Visual Disabilities
To successfully manage security and privacy threats, users must be able to perceive the
relevant information. However, a number of accessibility obstacles impede the access of …
relevant information. However, a number of accessibility obstacles impede the access of …
Systematization of password manageruse cases and design paradigms
Despite efforts to replace them, passwords remain the primary form of authentication on the
web. Password managers seek to address many of the problems with passwords by helping …
web. Password managers seek to address many of the problems with passwords by helping …
Understanding dynamics of initial trust and its antecedents in password managers adoption intention among young adults
A Farooq, A Dubinina, S Virtanen, J Isoaho - Procedia Computer Science, 2021 - Elsevier
Security professionals often suggest password managers as one of the best measures for
the end-users. However, the end-users have shown reluctance in adopting them, mostly due …
the end-users. However, the end-users have shown reluctance in adopting them, mostly due …
On smartphone users' difficulty with understanding implicit authentication
Implicit authentication (IA) has recently become a popular approach for providing physical
security on smartphones. It relies on behavioral traits (eg, gait patterns) for user …
security on smartphones. It relies on behavioral traits (eg, gait patterns) for user …
Real-time behavioral biometric information security system for assessment fraud detection
Online education has become a major delivery method in education. Many schools have
adopted online delivery of courses. This has exposed schools to greater information security …
adopted online delivery of courses. This has exposed schools to greater information security …
Two-factor password-authenticated key exchange with end-to-end security
We present a secure two-factor authentication (TFA) scheme based on the user's
possession of a password and a crypto-capable device. Security is “end-to-end” in the sense …
possession of a password and a crypto-capable device. Security is “end-to-end” in the sense …
An Analysis of Modern Password Manager Security and Usage on Desktop and Mobile Devices
T Oesch - 2021 - trace.tennessee.edu
Security experts recommend password managers to help users generate, store, and enter
strong, unique passwords. Prior research confirms that managers do help users move …
strong, unique passwords. Prior research confirms that managers do help users move …