“Nah, it's just annoying!” A deep dive into user perceptions of two-factor authentication

K Marky, K Ragozin, G Chernyshov… - ACM transactions on …, 2022 - dl.acm.org
Two-factor authentication (2FA) is a recommended or imposed authentication mechanism
for valuable online assets. However, 2FA mechanisms usually exhibit user experience …

Evaluating fallback authentication research: a systematic literature review

R AlHusain, A Alkhalifah - Computers & Security, 2021 - Elsevier
Fallback authentication refers to a chain of alternative authentication schemes that are
issued if the main authentication method fails such as the provision of information on …

Hybrid password meters for more secure passwords–a comprehensive study of password meters including nudges and password information

V Zimmermann, K Marky, K Renaud - Behaviour & Information …, 2023 - Taylor & Francis
Supporting users with secure password creation is a well-explored yet unresolved research
topic. A promising intervention is the password meter, ie providing feedback on the user's …

User-centred multimodal authentication: securing handheld mobile devices using gaze and touch input

M Khamis, K Marky, A Bulling, F Alt - Behaviour & Information …, 2022 - Taylor & Francis
Handheld mobile devices store a plethora of sensitive data, such as private emails, personal
messages, photos, and location data. Authentication is essential to protect access to …

Deep residual networks for user authentication via hand-object manipulations

K Choi, H Ryu, J Kim - Sensors, 2021 - mdpi.com
With the ubiquity of wearable devices, various behavioural biometrics have been exploited
for continuous user authentication during daily activities. However, biometric authentication …