An empirical study of a decentralized identity wallet: Usability, security, and perspectives on user control
User-centric digital identity initiatives are emerging with a mission to shift control over online
identity disclosures to the individual. However, there is little representation of prospective …
identity disclosures to the individual. However, there is little representation of prospective …
An overview of the present and future of user authentication
MA Al Kabir, W Elmedany - 2022 4th IEEE Middle East and …, 2022 - ieeexplore.ieee.org
Cybersecurity is an ever-evolving discipline that aims to protect every aspect of an
information system, including its users, from digital threats, adversaries and attacks. When it …
information system, including its users, from digital threats, adversaries and attacks. When it …
How many FIDO protocols are needed? Analysing the technology, security and compliance
To overcome the security vulnerabilities caused by weak passwords, thus bridge the gap
between user friendly interfaces and advanced security features, the Fast IDentity Online …
between user friendly interfaces and advanced security features, the Fast IDentity Online …
A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead
In the last decades, research has shown that both technical solutions and user perceptions
are important to improve security and privacy in the digital realm. The field of 'usable …
are important to improve security and privacy in the digital realm. The field of 'usable …
Threshold PAKE with security against compromise of all servers
We revisit the notion of threshold Password-Authenticated Key Exchange (tPAKE), and we
extend it to augmented tPAKE (atPAKE), which protects password information even in the …
extend it to augmented tPAKE (atPAKE), which protects password information even in the …
Evaluating the Security Posture of Real-World FIDO2 Deployments
FIDO2 is a suite of protocols that combines the usability of local authentication (eg,
biometrics) with the security of public-key cryptography to deliver passwordless …
biometrics) with the security of public-key cryptography to deliver passwordless …
User perceptions of the usability and security of smartphones as {FIDO2} roaming authenticators
The FIDO2 standard aims to replace passwords with public-key cryptography for user
authentication on the web. Doing so has benefits for both usability (eg, not needing to …
authentication on the web. Doing so has benefits for both usability (eg, not needing to …
Stealing trust: Unraveling blind message attacks in web3 authentication
As the field of Web3 continues its rapid expansion, the security of Web3 authentication, often
the gateway to various Web3 applications, becomes increasingly crucial. Despite its …
the gateway to various Web3 applications, becomes increasingly crucial. Despite its …
Account security interfaces: important, unintuitive, and untrustworthy
Online services increasingly rely on user-facing interfaces to communicate important
security-related account information—for example, which devices are logged into a user's …
security-related account information—for example, which devices are logged into a user's …
Understanding Users' Interaction with Login Notifications
Login notifications intend to inform users about sign-ins and help them protect their accounts
from unauthorized access. Notifications are usually sent if a login deviates from previous …
from unauthorized access. Notifications are usually sent if a login deviates from previous …