Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

" I Added'!'at the End to Make It Secure": Observing Password Creation in the Lab

B Ur, F Noma, J Bees, SM Segreti, R Shay… - Eleventh symposium on …, 2015 - usenix.org
Users often make passwords that are easy for attackers to guess. Prior studies have
documented features that lead to easily guessed passwords, but have not probed why users …

Demystifying authentication concepts in smartphones: Ways and types to secure access

S Gupta, A Buriro, B Crispo - Mobile Information Systems, 2018 - Wiley Online Library
Smartphones are the most popular and widespread personal devices. Apart from their
conventional use, that is, calling and texting, they have also been used to perform multiple …

Privacy preserving face recognition utilizing differential privacy

MAP Chamikara, P Bertok, I Khalil, D Liu… - Computers & Security, 2020 - Elsevier
Facial recognition technologies are implemented in many areas, including but not limited to,
citizen surveillance, crime control, activity monitoring, and facial expression evaluation …

Do users' perceptions of password security match reality?

B Ur, J Bees, SM Segreti, L Bauer, N Christin… - Proceedings of the …, 2016 - dl.acm.org
Although many users create predictable passwords, the extent to which users realize these
passwords are predictable is not well understood. We investigate the relationship between …

Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing

F Mathis, JH Williamson, K Vaniea… - ACM Transactions on …, 2021 - dl.acm.org
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …

The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …

Usability and security of text passwords on mobile devices

W Melicher, D Kurilova, SM Segreti, P Kalvani… - Proceedings of the …, 2016 - dl.acm.org
Recent research has improved our understanding of how to create strong, memorable text
passwords. However, this research has generally been in the context of desktops and …

Gamification techniques for raising cyber security awareness

S Scholefield, LA Shepherd - HCI for Cybersecurity, Privacy and Trust: First …, 2019 - Springer
Due to the prevalence of online services in modern society, such as internet banking and
social media, it is important for users to have an understanding of basic security measures in …

On the Impact of Touch {ID} on {iPhone} Passcodes

I Cherapau, I Muslukhov, N Asanka… - Eleventh Symposium On …, 2015 - usenix.org
Smartphones today store large amounts of data that can be confidential, private or sensitive.
To protect such data, all mobile OSs have a phone lock mechanism, a mechanism that …