On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?
Geumhwan ChoJun Ho HuhSoolin KimJunsung ChoHeesung ParkYenah LeeKonstantin BeznosovHyoungshick KimPublished in: ACM Trans. Priv. Secur. (2020)
Keyphrases
- security mechanisms
- security requirements
- identity authentication
- user authentication
- potential impact
- access control
- authentication mechanism
- data encryption
- authentication protocol
- augmented reality
- mobile devices
- security analysis
- information security
- security issues
- elliptic curve cryptography
- intrusion detection
- fuzzy vault