
This data repository contains all data we used in our study to develop a faceted classification scheme for authentication techniques. The repository is structured into 5 folders. Each folder contains the data that was used and generated in each of the steps of our methodology. - Step_1: Meta-Query, the python script that was used to query IEEE Xplore, and meta-data to all papers identified. - Step_2: Relavance Screening Prompt, the list of extracted relevant papers, and the results of the 5% sample that formed the ground truth and the comparison data by the LLM screening. - Step-3_4: All clusters we identified through semantic clustering. - Step_5: All authenticators and authentication techniques we identified, including a reference to the paper it was extracted from. - Step_6: The cecklist we developed and one positive and negative example of its application. Details on the methodology are presented in the paper.
