Usability of Token-based and Remote Electronic Signatures: A User Experience Study
- URL: http://arxiv.org/abs/2505.18814v1
- Date: Sat, 24 May 2025 18:21:06 GMT
- Title: Usability of Token-based and Remote Electronic Signatures: A User Experience Study
- Authors: Omer Ege, Mustafa Cagal, Kemal Bicakci,
- Abstract summary: This study empirically evaluates and compares two major e-signature systems -- token-based and remote signatures.<n>Remote e-signatures perceived as significantly more usable than token-based ones.<n>More participants preferred remote e-signatures for document signing, but preference did not reach statistical significance.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As electronic signatures (e-signatures) become increasingly integral to secure digital transactions, understanding their usability and security perception from an end-user perspective has become crucial. This study empirically evaluates and compares two major e-signature systems -- token-based and remote signatures -- through a controlled user experience study with 20 participants. Participants completed tasks involving acquisition, installation, and document signing using both methods, followed by structured surveys and qualitative feedback. Statistical analyses revealed that remote e-signatures were perceived as significantly more usable than token-based ones, due to their minimal setup and platform-independent accessibility. In contrast, token-based signatures were rated as significantly more secure, highlighting users' trust in hardware-based protection. Although more participants preferred remote e-signatures for document signing, the preference did not reach statistical significance, indicating a trend toward favoring convenience in real-world scenarios. These findings underline the fundamental trade-off between usability and perceived security in digital signing systems. By bridging the gap between theoretical frameworks and real user experience, this study contributes valuable insights to the design and policymaking of qualified electronic signature solutions.
Related papers
- An Improved U-Net Model for Offline handwriting signature denoising [0.0]
In forensic science appraisals, the analysis of offline handwriting signatures requires the appraiser to provide a certain number of signature samples.<n>The provided handwriting samples are often mixed with a large amount of interfering information, which brings severe challenges to handwriting identification work.<n>This study proposes a signature handwriting denoising model based on the improved U-net structure, aiming to enhance the robustness of the signature recognition system.
arXiv Detail & Related papers (2025-07-01T01:38:44Z) - Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a novel quantum digital signature protocol without a trusted third-party.<n>We prove that the protocol has information-theoretical unforgeability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - Assessing the Understandability and Acceptance of Attack-Defense Trees for Modelling Security Requirements [4.133045842892995]
Attack-Defense Trees (ADTs) are a graphical notation used to model and assess security requirements.
We conduct an experiment with 25 human subjects to assess the understandability and user acceptance of the ADT notation.
arXiv Detail & Related papers (2024-04-09T15:28:31Z) - Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication [0.44998333629984877]
We present a novel 2FA approach replacing the user's input with decisions made by Machine Learning (ML)
Our system exploits unique environmental features associated with the user, such as beacon frame characteristics and Received Signal Strength Indicator ( RSSI) values from Wi-Fi Access Points (APs)
For enhanced security, our system mandates that the user's two devices (i.e., a login device and a mobile device) be situated within a predetermined proximity before granting access.
arXiv Detail & Related papers (2024-01-12T14:58:15Z) - FedSOV: Federated Model Secure Ownership Verification with Unforgeable
Signature [60.99054146321459]
Federated learning allows multiple parties to collaborate in learning a global model without revealing private data.
We propose a cryptographic signature-based federated learning model ownership verification scheme named FedSOV.
arXiv Detail & Related papers (2023-05-10T12:10:02Z) - Introduction to Presentation Attacks in Signature Biometrics and Recent
Advances [5.984778372787988]
It is important not to forget that biometric systems have to withstand different types of possible attacks.
This chapter carries out an analysis of different Presentation Attack scenarios for on-line handwritten signature verification.
arXiv Detail & Related papers (2023-02-16T14:22:55Z) - Same or Different? Diff-Vectors for Authorship Analysis [78.83284164605473]
In classic'' authorship analysis a feature vector represents a document, the value of a feature represents (an increasing function of) the relative frequency of the feature in the document, and the class label represents the author of the document.
Our experiments tackle same-author verification, authorship verification, and closed-set authorship attribution; while DVs are naturally geared for solving the 1st, we also provide two novel methods for solving the 2nd and 3rd.
arXiv Detail & Related papers (2023-01-24T08:48:12Z) - Secure access system using signature verification over tablet PC [62.21072852729544]
We describe a highly versatile and scalable prototype for Web-based secure access using signature verification.
The proposed architecture can be easily extended to work with different kinds of sensors and large-scale databases.
arXiv Detail & Related papers (2023-01-11T11:05:47Z) - Sensor interoperability and fusion in signature verification: A case
study using tablet PC [66.32254395574994]
Two commercial Tablet PCs are evaluated for signature verification using two different commercial Tablet PCs.
An enrolment strategy using signatures from the two Tablet PCs is also proposed.
Authentication performance experiments are reported by using a database with over 3000 signatures.
arXiv Detail & Related papers (2022-10-20T10:06:36Z) - On-line signature verification using Tablet PC [61.81926091202142]
The on-line signature verification algorithm is adapted to work in Tablet PC environments.
Two different commercial Tablet PCs are evaluated.
Authentication performance experiments are reported considering both random and skilled forgeries.
arXiv Detail & Related papers (2022-10-20T09:59:28Z) - Revealing Reliable Signatures by Learning Top-Rank Pairs [15.582774097442721]
Signature verification is a crucial practical documentation analysis task.
We propose a new method to learn "top-rank pairs" for writer-independent offline signature verification tasks.
arXiv Detail & Related papers (2022-03-17T08:20:19Z) - Offline Signature Verification on Real-World Documents [9.271640666465363]
Signatures extracted from formal documents may contain different types of occlusions, for example, stamps, company seals, ruling lines, and signature boxes.
In this paper, we address a real-world writer independent offline signature verification problem, in which, a bank's customers' transaction request documents that contain their occluded signatures are compared with their clean reference signatures.
Our proposed method consists of two main components, a stamp cleaning method based on CycleGAN and signature representation based on CNNs.
arXiv Detail & Related papers (2020-04-25T10:28:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.