Survey and systematization of secure device pairing

M Fomichev, F Álvarez, D Steinmetzer… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …

Human factors in security research: Lessons learned from 2008-2018

M Kaur, M van Eeten, M Janssen, K Borgolte… - arxiv preprint arxiv …, 2021 - arxiv.org
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …

Do users' perceptions of password security match reality?

B Ur, J Bees, SM Segreti, L Bauer, N Christin… - Proceedings of the …, 2016 - dl.acm.org
Although many users create predictable passwords, the extent to which users realize these
passwords are predictable is not well understood. We investigate the relationship between …

User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking

N Gunson, D Marshall, H Morton, M Jack - Computers & Security, 2011 - Elsevier
This paper describes an experiment to investigate user perceptions of the usability and
security of single-factor and two-factor authentication methods in automated telephone …

The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …

“Nah, it's just annoying!” A deep dive into user perceptions of two-factor authentication

K Marky, K Ragozin, G Chernyshov… - ACM transactions on …, 2022 - dl.acm.org
Two-factor authentication (2FA) is a recommended or imposed authentication mechanism
for valuable online assets. However, 2FA mechanisms usually exhibit user experience …

System and method for assessing cybersecurity awareness

A Shabtai, R Puzis, L Rokach, L Orevi… - US Patent …, 2019 - Google Patents
Described embodiments include a system that includes a monitoring agent, configured to
automatically monitor usage of a computing device by a user, and a processor. The …

[PDF][PDF] A web of things application architecture: Integrating the real-world into the web

D Guinard - 2011 - research-collection.ethz.ch
A central concern in the area of pervasive computing has been the integration of digital
artifacts with the physical world and vice-versa. Recent developments in the field of …

Using a 2DST waveguide for usable, physically constrained out-of-band Wi-Fi authentication

M Budde, M Köpke, M Berning, T Riedel… - Proceedings of the 2013 …, 2013 - dl.acm.org
This paper proposes using a 2D waveguide for a novel means of authentication in public Wi-
Fi infrastructures. The design of the system is presented, and its practicability and usability is …

Behavior change interventions for cybersecurity

P Briggs, D Jeske, L Coventry - Behavior change research and theory, 2017 - Elsevier
While behavior change methods have become relatively commonplace in the health
domain, they have only recently been applied to the cybersecurity field. In this chapter we …