The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

J Bonneau, C Herley, PC Van Oorschot… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …

Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

D Wang, P Wang - Computer Networks, 2014 - Elsevier
Anonymity is among the important properties of two-factor authentication schemes for
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …

User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking

N Gunson, D Marshall, H Morton, M Jack - Computers & Security, 2011 - Elsevier
This paper describes an experiment to investigate user perceptions of the usability and
security of single-factor and two-factor authentication methods in automated telephone …

A birthday present every eleven wallets? the security of customer-chosen banking pins

J Bonneau, S Preibusch, R Anderson - Financial Cryptography and Data …, 2012 - Springer
We provide the first published estimates of the difficulty of guessing a human-chosen 4-digit
PIN. We begin with two large sets of 4-digit sequences chosen outside banking for online …

Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity

D Wang, N Wang, P Wang, S Qing - Information Sciences, 2015 - Elsevier
Due to its simplicity, portability and robustness, two-factor authentication has received much
interest in the past two decades. While security-related issues have been well studied, how …

The EMV standard: Break, fix, verify

D Basin, R Sasse, J Toro-Pozo - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
EMV is the international protocol standard for smartcard payment and is used in over 9
billion cards worldwide. Despite the standard's advertised security, various issues have …

Consumer-facing technology fraud: Economics, attack methods and potential solutions

MA Ali, MA Azad, MP Centeno, F Hao… - Future Generation …, 2019 - Elsevier
The emerging use of modern technologies has not only benefited society but also attracted
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …