2019
DOI: 10.1108/ics-01-2019-0020
|View full text |Cite
|
Sign up to set email alerts
|

Keep on rating – on the systematic rating and comparison of authentication schemes

Abstract: Purpose Six years ago, Bonneau et al. (2012) proposed a framework to compare authentication schemes to the ubiquitous text password. Even though their work did not reveal an alternative outperforming the text password on every criterion, the framework can support decision makers in finding suitable solutions for specific authentication contexts. The purpose of this paper is to extend and update the database, thereby discussing benefits, limitations and suggestions for continuing the development of the framewor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…Yet, selecting a suitable authentication scheme amongst the plethora of available schemes is a challenging task. A previously conducted rating of technical and objective aspects [7,53,44,80] revealed that none of the tested schemes outperformed the others in all regards. Instead, each scheme demonstrated strengths in certain areas and weaknesses in others.…”
Section: Introductionmentioning
confidence: 89%
See 2 more Smart Citations
“…Yet, selecting a suitable authentication scheme amongst the plethora of available schemes is a challenging task. A previously conducted rating of technical and objective aspects [7,53,44,80] revealed that none of the tested schemes outperformed the others in all regards. Instead, each scheme demonstrated strengths in certain areas and weaknesses in others.…”
Section: Introductionmentioning
confidence: 89%
“…For all contexts of use, the participants rated all three authentication schemes. A list of potential reasons for the participants' choice was derived from a literature review described in [80] and previous interview studies including the follow-up interviews in [79]. The potential reasons were clustered in terms of whether they concerned the login credentials or the authentication scheme and displayed as a matrix.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, users also struggle to remember their passwords locking them out of their accounts [29]. Still, due to the easy deployment of passwords, they are unlikely to vanish soon [5,66]. A usable coniguration for enabling 2FA that is technologically robust, however, has not been realized yet [5,65].…”
Section: Usability Of Authenticationmentioning
confidence: 99%
“…• The study of [37] extends from the framework proposed in [7] by revisiting the rating process and reviewing additional authentication schemes.…”
Section: Decision Frameworkmentioning
confidence: 99%