Usability, longitudinal study, YubiKey I. Index Terms-two-factor authentication, hardware tokens, Standardizing the setup process, enabling verification of success,Īllowing shared accounts, integrating with operating systems, Security keys that would not have been evident from either Conducting both a laboratoryĪnd longitudinal study yielded insights into the usability of Lives over a period of four weeks, revealing that participants Second study had 25 participants use a YubiKey in their daily Successfully enabled 2FA when they had not. Themselves out of their operating system or thinking they had With setup instructions and workflow including users locking With configuring a Windows, Google, and Facebook account toĪuthenticate using a YubiKey. We conducted two user studies of the YubiKey, a popular line ToĮxamine the usability of security keys in non-enterprise usage, Users to press a button on the security key to authenticate. Recently, there has been increased interest in Universal 2ndįactor (U2F) security keys-small hardware devices that require Improves the security of password-based authentication. A Tale of Two Studies: The Best and Worst of YubiKey Usability Joshua Reynolds †∗, Trevor Smith ∗, Ken Reese ∗, Luke Dickinson ∗, Scott Ruoti ‡, Kent Seamons ∗ † University of Illinois at Urbana-Champaign, ∗ Brigham Young University, ‡ MIT Lincoln Laboratory ken, authentication (2FA) significantly
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |