2017 2nd IEEE International Conference on Recent Trends in Electronics, Information &Amp; Communication Technology (RTEICT) 2017
DOI: 10.1109/rteict.2017.8256716
|View full text |Cite
|
Sign up to set email alerts
|

Survey on usable and secure two-factor authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(17 citation statements)
references
References 8 publications
0
17
0
Order By: Relevance
“…Rather than fundamental alternatives being implemented, most ecosystems have simply padded their authentication processes with additional factors. This trend can be seen in the rise of two-factor or multi-factor authentication, colloquially known as 2FA and MFA respectively [ 10 , 11 , 12 , 13 ]. However, the rise of padding front-end authentication portals with such techniques has led to inflated user responsibilities without as great of security as is thought; these methods help protect against front-facing brute-forcing and dictionary attacks, but often do not add any additional layers of protection to more common forms of cyber-attacks, such as phishing, man-in-the-middle (MiTM), or replay attacks [ 7 , 8 , 12 , 14 , 15 ].…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
See 3 more Smart Citations
“…Rather than fundamental alternatives being implemented, most ecosystems have simply padded their authentication processes with additional factors. This trend can be seen in the rise of two-factor or multi-factor authentication, colloquially known as 2FA and MFA respectively [ 10 , 11 , 12 , 13 ]. However, the rise of padding front-end authentication portals with such techniques has led to inflated user responsibilities without as great of security as is thought; these methods help protect against front-facing brute-forcing and dictionary attacks, but often do not add any additional layers of protection to more common forms of cyber-attacks, such as phishing, man-in-the-middle (MiTM), or replay attacks [ 7 , 8 , 12 , 14 , 15 ].…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
“…While these multi-factor methods may help obscure access control, they do not always prevent information, such as the password or password-hash itself, from being stolen. Since users tend to re-use passwords across websites, this threat still exists as not every website has implemented 2FA/MFA protections [ 10 , 11 , 17 , 18 , 19 ].…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
See 2 more Smart Citations
“…This capability of passthoughts can potentially overcome a significant limitation to the usability of multi-factor authentication systems which typically require a separate action from the user for each factor. [172][173][174][175] In order to achieve single-step multi-factor authentication with passthoughts, a mental task is required that can serve as a secret. In the case of mental commands, this can be a sequence of commands which form a sort of password.…”
Section: System Requirementsmentioning
confidence: 99%