[HTML][HTML] Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites

AS Albesher - Sustainability, 2023 - mdpi.com
A sustainable online environment is essential to protecting businesses from abuse and data
breaches. To protect sustainability, websites' authentication procedures should continuously …

Adventures in recovery land: Testing the account recovery of popular websites when the second factor is lost

E Gerlitz, M Häring, CT Mädler, M Smith… - … Symposium on Usable …, 2023 - usenix.org
Literature on two-factor authentication (2FA) lists users' fear of losing the second factor as
one major constraint on acceptability. Nonetheless, more and more services offer or even …

Assessing website password practices–Unchanged after fifteen years?

S Furnell - Computers & Security, 2022 - Elsevier
Passwords continue to occupy an interesting position in cyber security, being both widely
used and widely criticised at the same time. In many cases the criticism is levelled at users …

A user study of keystroke dynamics as second factor in web MFA

AA Wahab, D Hou, S Schuckers - … of the Thirteenth ACM Conference on …, 2023 - dl.acm.org
As account compromises and malicious online attacks are on the rise, multi-factor
authentication (MFA) has been adopted to defend against these attacks. OTP and mobile …

" We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments

S Amft, S Höltervennhoff, N Huaman, A Krause… - Proceedings of the …, 2023 - dl.acm.org
Multi-Factor Authentication is intended to strengthen the security of password-based
authentication by adding another factor, such as hardware tokens or one-time passwords …

The access control double bind: How everyday interfaces regulate access and privacy, enable surveillance, and enforce identity

DL Gardner, TJ Tanenbaum - Convergence, 2023 - journals.sagepub.com
Access controls are an inescapable and deceptively mundane requirement for accessing
digital applications and platforms. These systems enable and enforce practices related to …

Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication.

S Amft, S Höltervennhoff, N Huaman, A Krause… - 2023 - publications.cispa.de
Multi-Factor Authentication is intended to strengthen the security of password-based
authentication by adding another factor, such as hardware tokens or one-time passwords …

Investigating verification behavior and perceptions of visual digital certificates

D Gerhardt, A Ponticello, A Dabrowski… - 32nd USENIX Security …, 2023 - usenix.org
Investigating Verification Behavior and Perceptions of Visual Digital Certificates Page 1 This
paper is included in the Proceedings of the 32nd USENIX Security Symposium. August 9–11 …

Auth4App: Streamlining authentication for integrated cyber–physical environments

VE Quincozes, RB Mansilha, D Kreutz, CC Miers… - Journal of Information …, 2024 - Elsevier
The growing integration of mobile applications for user authentication has revolutionized
user interactions with digital platforms, offering novel possibilities in user experience (UX) …

Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy

A Nash, H Studiawan, G Grispos, KKR Choo - International Conference on …, 2023 - Springer
As the use of authenticator applications for two-factor authentication (2FA) has become
increasingly common, there is a growing need to assess the security of these applications. In …