A qualitative study on usability and acceptability of Yubico security key (original) (raw)

Why Johnny Doesn’t Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key

Jean Camp

Financial Cryptography and Data Security

View PDFchevron_right

They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking

Angela Sasse

Proceedings 2015 Workshop on Usable Security, 2015

View PDFchevron_right

Impediments to Adoption of Two-factor Authentication by Home End-Users

Preston Ackerman

2020

View PDFchevron_right

Until you have something to lose! Loss aversion and two-factor authentication adoption

Ahmad Pratama

Applied Computing and Informatics, 2021

View PDFchevron_right

User Perceptions of Security and Usability of Mobile-Based Single Password Authentication and Two-Factor Authentication

Aykut Coşkun

Lecture Notes in Computer Science, 2019

View PDFchevron_right

Non-Inclusive Online Security: Older Adults\u27 Experience with Two-Factor Authentication

Jean Camp

2021

View PDFchevron_right

Evaluating the Performance of Two-Factor Authentication Solution in the Banking Sector

Olufemi Sunday Adeoye

2014

View PDFchevron_right

Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication

Jean Camp

2021

View PDFchevron_right

Two Factor Authentication Made Easy

Weihan Goh

15th International Conference on Web Engineering (ICWE)

View PDFchevron_right

Exploring human factors issues & possible countermeasures in password authentication

Nur Zakaria

2013

View PDFchevron_right

Factors Influencing The Experiences of End-users in Password-Based Authentication System

celestine ugwu

Research Square (Research Square), 2024

View PDFchevron_right

Security and usability in password authentication

Merve Yıldırım

2017

View PDFchevron_right

Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA

Yousra Javed

Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies

View PDFchevron_right

Human Performance in Google’s Two-factor Authentication Setup Process

tewodros belete taffese

Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2019

View PDFchevron_right

Password Authentication from a Human Factors Perspective: Results of a Survey among End-Users

Peter Hoonakker

PsycEXTRA Dataset, 2000

View PDFchevron_right

User Study on Single Password Authentication

Aykut Coşkun

IACR Cryptol. ePrint Arch., 2018

View PDFchevron_right

An Exploratory Investigation Into the Use of eAUP as an Alternative to Text-based Passwords

Joseph A Abandoh-Sam

View PDFchevron_right

Are Passfaces More Usable Than Passwords? A Field Trial Investigation

Angela Sasse

People and Computers XIV — Usability or Else!, 2000

View PDFchevron_right

An Empirical Assessment of Factors Impeding Effective Password Management

Lynette Drevin

Journal of Information Privacy and Security, 2008

View PDFchevron_right

“Technology Should Be Smarter Than This!”: A Vision for Overcoming the Great Authentication Fatigue

Angela Sasse

Lecture Notes in Computer Science, 2014

View PDFchevron_right

The Current Use of Authentication Technologies: An Investigative Review

Christoph Reich

2015 International Conference on Cloud Computing (ICCC), 2015

View PDFchevron_right

A Field Study of User Behavior and Perceptions in Smartcard Authentication

Celeste Lyn Paul

View PDFchevron_right

A User Study of Keystroke Dynamics as Second Factor in Web MFA

Daqing Hou

Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy

View PDFchevron_right

Influences on the Adoption of Multifactor Authentication

Martin Libicki

2011

View PDFchevron_right

PINs, passwords and human memory

Wendy Moncur

2009

View PDFchevron_right

Evaluation of the Human Impact of Password Authentication

Pamela McCauley

Informing Science: The International Journal of an Emerging Transdiscipline, 2004

View PDFchevron_right

Bootstrapping Adoption of the Pico Password Replacement System

Jeunese Payne, Graeme Jenkinson, Quentin Stafford-Fraser

Lecture Notes in Computer Science, 2014

View PDFchevron_right

How do Pictographs Impact on Preferring 2FA over 1FA while using Online Banking

Imran Butt

View PDFchevron_right

Deploying authentication in the wild: towards greater ecological validity in security usability studies

Toshiyuki Masui

Journal of Cybersecurity, 2020

View PDFchevron_right

The Future of Authentication

Jesus Molina

IEEE Security & Privacy Magazine, 2012

View PDFchevron_right

Usability, security and trust in password managers: A quest for user-centric properties and features

Sunil Chaudhary

Computer Science Review, 2019

View PDFchevron_right

Millennials' Intention to Use a Typing Pattern Biometric Keypad

Arnold Kamis

View PDFchevron_right