Proceedings 2023 Network and Distributed System Security Symposium 2023
DOI: 10.14722/ndss.2023.23362
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…A more recent work by Lyastani et al evaluated 85 websites regarding their MFA usability by creating accounts and evaluating their MFA communication and settings. They found that MFA implementations are largely inconsistent between different websites, and that many designs have previously been identified as obstructive or problematic [36].…”
Section: Multi-factor Authentication Usabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…A more recent work by Lyastani et al evaluated 85 websites regarding their MFA usability by creating accounts and evaluating their MFA communication and settings. They found that MFA implementations are largely inconsistent between different websites, and that many designs have previously been identified as obstructive or problematic [36].…”
Section: Multi-factor Authentication Usabilitymentioning
confidence: 99%
“…Previous work often focused on investigating the theoretical usability of recovery procedures in different areas [36,37,42,48,65,71,75]. In contrast, our work studies the first-hand user experience of MFA recovery procedures on websites: We went through the actual MFA recovery procedure processes implemented by 71 websites and reported lessons learned.…”
Section: Putting Our Work Into Contextmentioning
confidence: 99%
See 1 more Smart Citation
“…To achieve the goal of strengthening authentication systems, a hybrid mechanism of authentication is designed and proposed, based on the complementary application of three main authentication factors, namely, the biometric component ("something you are"), the RFID, and the cryptographic component ("something you have") [1]. Systems that incorporate multi-factor authentication are considered to be more powerful and robust compared to those that use only one factor and have the role of increasing the degree of data security in the process of verifying the identity of an authorized user who tries to access a computer system.…”
Section: Introductionmentioning
confidence: 99%