Still, Jeremiah D.; Cain, Ashley; Schuster, David - In: Information & Computer Security 25 (2017) 4, pp. 437-453
general set of domain-specific guidelines has not yet been developed. This paper aims to present and explain a list of human …-centered guidelines for developing usable authentication schemes. Design/methodology/approach The guidelines stem from research findings … authentication interfaces can be improved and what human capabilities can be exploited. A list of six guidelines that designers ought …