@inproceedings{kieseberg_evaluation_2021, address = {Penn State University Altoona, Pennsilvania, USA}, title = {Evaluation of {Password} {Replacement} {Schemes}}, abstract = {The digital world has developed very rapidly over the past few decades. Laptops, smartphones and tablets have become objects of daily use and many users use dozens of services on these devices. But the login procedure for devices and services has not changed - especially for web applications. The combination of username and password has always been the most common method of logging in. The aim of this work is to explain why the password is still the most popular method of logging in users, despite the large number of alternatives and known weaknesses. For this purpose, different methods were evaluated in a fixed schema of 12 rating-criteria in the categories: usability, security and applicability for continuous authentication. No method was able to fulfil all criteria and it shows that higher security is mainly achievable in exchange for usability. Keywords-authentication, passwords, alternative authentication methods}, booktitle = {Proceedings 2021 {International} {Conference} on {Software} {Security} and {Assurance} ({ICSSA}), {IEEE}}, author = {Kieseberg, Peter and Bechtel, Thomas and Tjoa, Simon}, month = oct, year = {2021}, keywords = {FH SP Cyber Security, Forschungsgruppe Secure Societies, Institut für IT Sicherheitsforschung, SP IT Sec Applied Security \& Data Science, Vortrag, Wiss. Beitrag, peer-reviewed}, }