ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2003.07622
  4. Cited By
Is This Really You? An Empirical Study on Risk-Based Authentication
  Applied in the Wild

Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild

IFIP International Information Security Conference (IFIP SEC), 2019
17 March 2020
Stephan Wiefling
Luigi Lo Iacono
Markus Dürmuth
ArXiv (abs)PDFHTML

Papers citing "Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild"

20 / 20 papers shown
Simple But Not Secure: An Empirical Security Analysis of Two-factor Authentication Systems
Zhi Wang
Xin Yang
Du Chen
Han Gao
Meiqi Tian
Yan Jia
Wanpeng Li
221
0
0
18 Nov 2024
Privacy-Enhanced Adaptive Authentication: User Profiling with Privacy Guarantees
Privacy-Enhanced Adaptive Authentication: User Profiling with Privacy Guarantees
Yaser Baseri
A. Hafid
Dimitrios Makrakis
320
4
0
27 Oct 2024
Evaluating the Influence of Multi-Factor Authentication and Recovery
  Settings on the Security and Accessibility of User Accounts
Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User AccountsInternational Conference on Information Systems Security and Privacy (ICISSP), 2024
Andre Büttner
Nils Gruschka
114
3
0
22 Mar 2024
Is It Really You Who Forgot the Password? When Account Recovery Meets
  Risk-Based Authentication
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based AuthenticationInternational Conference on Ubiquitous Security (UbiSec), 2024
Andre Büttner
Andreas Thue Pedersen
Stephan Wiefling
Nils Gruschka
Luigi Lo Iacono
178
2
0
18 Mar 2024
"Make Them Change it Every Week!": A Qualitative Exploration of Online
  Developer Advice on Usable and Secure Authentication
"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure AuthenticationConference on Computer and Communications Security (CCS), 2023
J. Klemmer
Marco Gutfleisch
Christian Stransky
Yasemin Acar
M. Sasse
Sascha Fahl Leibniz University Hannover
235
14
0
01 Sep 2023
Evaluation of Real-World Risk-Based Authentication at Online Services
  Revisited: Complexity Wins
Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity WinsARES (ARES), 2023
Jan-Phillip Makowski
Daniela Pöhn
227
7
0
29 Aug 2023
Risk-Based Authentication for OpenStack: A Fully Functional
  Implementation and Guiding Example
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding ExampleConference on Data and Application Security and Privacy (CODASPY), 2023
Vincent Unsel
Stephan Wiefling
Nils Gruschka
Luigi Lo Iacono
208
9
0
22 Mar 2023
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring
  Profile Sales on an Active, Leading Criminal Market for User Impersonation at
  Scale
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at ScaleUSENIX Security Symposium (USENIX Security), 2023
Michele Campobasso
Luca Allodi
311
7
0
06 Mar 2023
Privacy Considerations for Risk-Based Authentication Systems
Privacy Considerations for Risk-Based Authentication Systems
Stephan Wiefling
Jan Tolsdorf
Luigi Lo Iacono
189
13
0
04 Jan 2023
Understanding Users' Interaction with Login Notifications
Understanding Users' Interaction with Login NotificationsInternational Conference on Human Factors in Computing Systems (CHI), 2022
Philipp Markert
Leona Lassak
Maximilian Golla
Markus Dürmuth
481
10
0
14 Dec 2022
Is FIDO2 Passwordless Authentication a Hype or for Real?: A Position
  Paper
Is FIDO2 Passwordless Authentication a Hype or for Real?: A Position Paper
K. Bicakci
Yusuf Uzunay
132
17
0
14 Nov 2022
A Systematic Study of the Consistency of Two-Factor Authentication User
  Journeys on Top-Ranked Websites (Extended Version)
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version)Network and Distributed System Security Symposium (NDSS), 2022
Sanam Ghorbani Lyastani
Michael Backes
Sven Bugiel
86
16
0
17 Oct 2022
mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web
  Applications
mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications
David Monschein
O. P. Waldhorst
197
1
0
07 Oct 2022
Pump Up Password Security! Evaluating and Enhancing Risk-Based
  Authentication on a Real-World Large-Scale Online Service
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online ServiceACM Transactions on Privacy and Security (TOPS), 2022
Stephan Wiefling
Paul René Jørgensen
Sigurd Thunem
Luigi Lo Iacono
296
38
0
30 Jun 2022
FIDO2 With Two Displays-Or How to Protect Security-Critical Web
  Transactions Against Malware Attacks
FIDO2 With Two Displays-Or How to Protect Security-Critical Web Transactions Against Malware Attacks
Timon Hackenjos
Benedikt Wagner
Julian Herr
Jochen Rill
Marek Wehmer
Niklas Goerke
Ingmar Baumgart
164
0
0
27 Jun 2022
What's in Score for Website Users: A Data-driven Long-term Study on
  Risk-based Authentication Characteristics
What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication CharacteristicsFinancial Cryptography (FC), 2021
Stephan Wiefling
Markus Dürmuth
Luigi Lo Iacono
129
22
0
26 Jan 2021
More Than Just Good Passwords? A Study on Usability and Security
  Perceptions of Risk-based Authentication
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based AuthenticationAsia-Pacific Computer Systems Architecture Conference (ACSA), 2020
Stephan Wiefling
Markus Dürmuth
Luigi Lo Iacono
190
42
0
01 Oct 2020
Impersonation-as-a-Service: Characterizing the Emerging Criminal
  Infrastructure for User Impersonation at Scale
Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at ScaleConference on Computer and Communications Security (CCS), 2020
Michele Campobasso
Luca Allodi
116
39
0
09 Sep 2020
Evaluation of Risk-based Re-Authentication Methods
Evaluation of Risk-based Re-Authentication Methods
Stephan Wiefling
Tanvi Patil
Markus Dürmuth
Luigi Lo Iacono
AAML
88
26
0
18 Aug 2020
A Large-scale Empirical Analysis of Browser Fingerprints Properties for
  Web Authentication
A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication
Nampoina Andriamilanto
T. Allard
Gaëtan Le Guelvouit
Alexandre Garel
251
22
0
16 Jun 2020
1
Page 1 of 1