Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust 2018
DOI: 10.1145/3167996.3167997
|View full text |Cite
|
Sign up to set email alerts
|

A qualitative study on usability and acceptability of Yubico security key

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
36
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(45 citation statements)
references
References 19 publications
1
36
0
Order By: Relevance
“…The need to authenticate IoT servers and IoT devices using security keys has attracted the attention of different groups of researchers and scholars in the eld of information technology. According to [10], authentication of online accounts is something that many people understand as something you have, something you are, or something you know. This partly implies the use of passphrases, PINs, and passwords as knowledge; physical tokens as possessions, and biometric identity as a form of being intrinsic to oneself [10].…”
Section: A Security Keysmentioning
confidence: 99%
See 4 more Smart Citations
“…The need to authenticate IoT servers and IoT devices using security keys has attracted the attention of different groups of researchers and scholars in the eld of information technology. According to [10], authentication of online accounts is something that many people understand as something you have, something you are, or something you know. This partly implies the use of passphrases, PINs, and passwords as knowledge; physical tokens as possessions, and biometric identity as a form of being intrinsic to oneself [10].…”
Section: A Security Keysmentioning
confidence: 99%
“…According to [10], authentication of online accounts is something that many people understand as something you have, something you are, or something you know. This partly implies the use of passphrases, PINs, and passwords as knowledge; physical tokens as possessions, and biometric identity as a form of being intrinsic to oneself [10]. Other authentication techniques might include someone that you are conversant with and where you are.…”
Section: A Security Keysmentioning
confidence: 99%
See 3 more Smart Citations