Still et al., 2017 - Google Patents
Human-centered authentication guidelinesStill et al., 2017
View PDF- Document ID
- 18425132535421729239
- Author
- Still J
- Cain A
- Schuster D
- Publication year
- Publication venue
- Information and Computer Security
External Links
Snippet
Purpose Despite the widespread use of authentication schemes and the rapid emergence of novel authentication schemes, a general set of domain-specific guidelines has not yet been developed. This paper aims to present and explain a list of human-centered guidelines for …
- 238000000034 method 0 abstract description 34
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Still et al. | Human-centered authentication guidelines | |
Das et al. | Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key | |
Reynolds et al. | A tale of two studies: The best and worst of yubikey usability | |
Cherapau et al. | On the Impact of Touch {ID} on {iPhone} Passcodes | |
Schumacher et al. | Security Patterns: Integrating security and systems engineering | |
US10275602B2 (en) | Method and apparatus for an end user identity protection suite | |
Das et al. | Non-inclusive online security: older adults' experience with two-factor authentication | |
Alnfiai et al. | BraillePassword: accessible web authentication technique on touchscreen devices | |
TWI524719B (en) | A system and method for identifying and linking users having matching confidential information | |
Kaushik et al. | {GuardLens}: Supporting safer online browsing for people with visual impairments | |
Huang et al. | Users' Perceptions of Chrome Compromised Credential Notification | |
Hammann et al. | I’m surprised so much is connected | |
Fanti | Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA | |
Mwagwabi | A Protection Motivation Theory approach to improving compliance with password guidelines | |
Garibyan et al. | Access and identity management for libraries: controlling access to online information | |
Furuberg et al. | From password to passwordless: Exploring user experience obstacles to the adoption of FIDO2 authentication | |
Aljaffan | Password security and usability: from password checkers to a new framework for user authentication | |
Renaud | A process for supporting risk-aware web authentication mechanism choice | |
Lehtoniemi | Exploring Factors Affecting Ransomware-as-a-Service Proliferation | |
Gutmann | An Analysis of Computer Systems for the Secure Creation and Verification of User Instructions | |
Sauer et al. | User Experience and Information Security Implications of Digital Identity Wallets | |
Perrault | Towards Inclusive Design of Mobile Privacy and Security for Older Adults | |
Ramadas et al. | Client management system with two factor authentication and anti input injection for Asian Life Travels Sdn Bhd | |
Anwar | Adaptive Digital Identity Verification Reference Architecture (ADIVRA) Framework | |
Oakley et al. | Keeping Secrets from Friends: Design Guidelines for Multiplexed Graphical Passwords |