Deploying authentication in the wild: towards greater ecological validity in security usability studies.
Seb AebischerClaudio DettoniGraeme JenkinsonKat KrolDavid Llewellyn-JonesToshiyuki MasuiFrank StajanoPublished in: J. Cybersecur. (2020)
Keyphrases
- usability studies
- security mechanisms
- security requirements
- identity authentication
- fuzzy vault
- user authentication
- authentication mechanism
- authentication protocol
- encryption decryption
- data encryption
- integrity verification
- security analysis
- biometric data
- security issues
- factor authentication
- authentication systems
- smart card
- security services
- information security
- key distribution
- eye tracking
- private key
- authentication scheme
- virtual private network
- identity management
- key agreement protocol
- security systems
- security policies
- biometric template
- trust negotiation
- biometric authentication
- public key
- key agreement
- secret key
- security protocols
- security level
- key management
- graphical password
- public key cryptography
- access control
- expert systems
- multimedia