[go: up one dir, main page]

Still et al., 2017 - Google Patents

Human-centered authentication guidelines

Still et al., 2017

View PDF
Document ID
18425132535421729239
Author
Still J
Cain A
Schuster D
Publication year
Publication venue
Information and Computer Security

External Links

Snippet

Purpose Despite the widespread use of authentication schemes and the rapid emergence of novel authentication schemes, a general set of domain-specific guidelines has not yet been developed. This paper aims to present and explain a list of human-centered guidelines for …
Continue reading at scholarworks.sjsu.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Still et al. Human-centered authentication guidelines
Das et al. Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key
Reynolds et al. A tale of two studies: The best and worst of yubikey usability
Cherapau et al. On the Impact of Touch {ID} on {iPhone} Passcodes
Schumacher et al. Security Patterns: Integrating security and systems engineering
US10275602B2 (en) Method and apparatus for an end user identity protection suite
Das et al. Non-inclusive online security: older adults' experience with two-factor authentication
Alnfiai et al. BraillePassword: accessible web authentication technique on touchscreen devices
TWI524719B (en) A system and method for identifying and linking users having matching confidential information
Kaushik et al. {GuardLens}: Supporting safer online browsing for people with visual impairments
Huang et al. Users' Perceptions of Chrome Compromised Credential Notification
Hammann et al. I’m surprised so much is connected
Fanti Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA
Mwagwabi A Protection Motivation Theory approach to improving compliance with password guidelines
Garibyan et al. Access and identity management for libraries: controlling access to online information
Furuberg et al. From password to passwordless: Exploring user experience obstacles to the adoption of FIDO2 authentication
Aljaffan Password security and usability: from password checkers to a new framework for user authentication
Renaud A process for supporting risk-aware web authentication mechanism choice
Lehtoniemi Exploring Factors Affecting Ransomware-as-a-Service Proliferation
Gutmann An Analysis of Computer Systems for the Secure Creation and Verification of User Instructions
Sauer et al. User Experience and Information Security Implications of Digital Identity Wallets
Perrault Towards Inclusive Design of Mobile Privacy and Security for Older Adults
Ramadas et al. Client management system with two factor authentication and anti input injection for Asian Life Travels Sdn Bhd
Anwar Adaptive Digital Identity Verification Reference Architecture (ADIVRA) Framework
Oakley et al. Keeping Secrets from Friends: Design Guidelines for Multiplexed Graphical Passwords