Usable Authentication | Datenschutz und Datensicherheit - DuD Skip to main content
Log in

Usable Authentication

Respecting User Preferences

  • Schwerpunkt
  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

References

  1. Anthony Y. Fu, X. D. (2006). The Methodology and an Application to Fight against Unicode Attacks.

    Google Scholar 

  2. BSI. (2014). Technical Guideline TR-03107-1 Electronic Identities and Trust Services in E-Government. Bundesamt für Sicherheit in der Informationstechnik, Bonn.

  3. Chandrasekhar Bhagavatula, B. U. (2015, February 8). Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption. USEC’ 15.

  4. Cluley, G. (2013, March 2). NakedSecurity, Evernote hacked–almost 50 million passwords reset after security breach. Retrieved April 4, 2014, from http://nakedsecurity.sophos.com/2013/03/02/evernote-hacked-almost-50-million-passwords-reset-after-security-breach/

  5. David A. Willis, Gartner. (2013). Bring Your Own Device: The Facts and the Future. Gartner.

  6. David Moth, Econsultancy. (2013, September 25). Nine case studies and infographics on cart abandonment and email retargeting. Retrieved from econsultancy.com: https://econsultancy.com/blog/63466-nine-casestudies-and-infographics-on-cart-abandonment-and-email-retargeting/

  7. Dinei Florêncio and Cormac Herley, Microsoft Research. (2007). A Large-Scale Study of Web Password Habits. Redmond.

  8. Dr. Thomas Probst. (2001). Voraussetzungen für den Ersatz der PIN bei Geldausgabeautomaten. Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein, Kiel.

  9. ENISA. (2012, July 05). Flash note: EU cyber security agency ENISA; “High Roller” online bank robberies reveal security gaps. Retrieved January 24, 2014, from http://www.enisa.europa.eu/media/press-releases/eu-cyber-security-agency-enisa-201chigh-roller201d-online-bank-robberies-reveal-security-gaps

  10. Gregory D. Williamson, GE Money–America’s. (2006). Enhanced Authentication In Online Banking. Journal of Economic Crime Management, pp. Fall 2006, Volume 4, Issue 2.

  11. Oli. (2007, December 2). Fingerabdruck-Bezahlsystem bei Edeka überlistet. Retrieved from Oli-B-Log: http://oli-b-log.blogspot.de/2007/12/fingerabdruck-bezahlsystem-bei-edeka.html

  12. Rolf Lindemann, Davit Baghdsaryan and Eric Tiffany. (2014). FIDO UAF Protocol Specification. Palo Alto: FIDO Alliance.

  13. Rolf Lindemann, Nok Nok Labs. (2014). Delivering Secure, Strong Authentication–The Role of the TEE, SE & SIM in the FIDO Protocol. Cartes. Paris.

  14. Seltmann, U. (2009, November 26). Mit dem Fingerabdruck Lebensmittel bezahlen. Retrieved from Geld Kompakt: http://www.geld-kompakt. de/2009/11/26/fingerabdruck-lebensmittel-bezahlen/

  15. Slivka, E. (2014, June 2). Apple’s WWDC 2014 Keynote. Retrieved January 31, 2016, from MacRumors: http://www.macrumors.com/2014/06/02/wwdc-2014-keynote-live/

  16. Verizon. (2015). 2015 Data Breach Investigations Report. Verizon.

  17. Ziegler, P.-M. (2005, March 5). EDEKA setzt auf Fingerabdruck-Bezahlsystem. Retrieved from Heise.de: http://www.heise.de/newsticker/meldung/EDEKA-setzt-auf-Fingerabdruck-Bezahlsystem-140383.html

Download references

Author information

Authors and Affiliations

Authors

Additional information

Rolf Lindemann works for Nok Nok Labs, Inc. as Senior Director Products & Technology. He has contributed to numerous FIDO specifications. E-Mail: rlindemann@noknok.com

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lindemann, R. Usable Authentication. Datenschutz Datensich 40, 229–230 (2016). https://doi.org/10.1007/s11623-016-0584-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-016-0584-z