Result Count

0/0

Step 1: Choose Features

33% Complete

Choose the features that are important for you and align them in descending order on the right hand side. Features in the same group are equally important.


  1. Accessible
    Deployability
  2. Browser-Compatible
    Deployability
  3. Mature
    Deployability
  4. Negligible-Cost-per-User
    Deployability
  5. Non-Proprietary
    Deployability
  6. Server-Compatible
    Deployability
  7. Resilient-to-Internal-Observation
    Security
  8. Resilient-to-Leaks-form-Other-Verifiers
    Security
  9. Resilient-to-Phishing
    Security
  10. Resilient-to-Physical-Oberservation
    Security
  11. Resilient-to-Targeted-Impersonation
    Security
  12. Resilient-to-Theft
    Security
  13. Resilient-to-Third-Party
    Security
  14. Resilient-to-Throttled-Guessing
    Security
  15. Resilient-to-Unthrottled-Guessing
    Security
  16. Unlinkable
    Security
  17. Easy-Recovery-from-Loss
    Usability
  18. Easy-to-Learn
    Usability
  19. Efficient-to-Use
    Usability
  20. Infrequent-Errors
    Usability
  21. Memorywise-Effortless
    Usability
  22. Nothing-to-Carry
    Usability
  23. Physically-Effortless
    Usability
  24. Scalable-for-Users
    Usability