Secure and Usable Enterprise Authentication: Lessons from the Field.
Mary TheofanosSimson L. GarfinkelYee-Yin ChoongPublished in: IEEE Secur. Priv. (2016)
Keyphrases
- security requirements
- security mechanisms
- authentication mechanism
- user authentication
- security analysis
- password authentication
- authentication scheme
- data encryption
- identity management
- security management
- factor authentication
- authentication protocol
- security services
- identity authentication
- biometric authentication
- integrity verification
- secure manner
- key agreement
- key agreement protocol
- trusted third party
- secure communication
- information systems
- key distribution
- management information systems
- competitive advantage
- interactive video
- smart card
- knowledge management