Title of article
Comparing passwords, tokens, and biometrics for user authentication
Author/Authors
L.، OGorman, نويسنده ,
Issue Information
روزنامه با شماره پیاپی سال 2003
Pages
-2020
From page
2021
To page
0
Abstract
For decades, the password has been the standard means for user authentication on computers. However, as users are required to remember more, longer, and changing passwords, it is evident that a more convenient and secure solution to user authentication is necessary. This paper examines passwords, security tokens, and biometrics-which we collectively call authenticators-and compares these authenticators and their combinations. We examine their effectiveness against several attacks and suitability for particular security specifications such as compromise detection and nonrepudiation. Examples of authenticator combinations and protocols are described to show tradeoffs and solutions that meet chosen, practical requirements. The paper endeavors to offer a comprehensive picture of user authentication solutions for the purposes of evaluating options for use and identifying deficiencies requiring further research.
Keywords
specific nano initiatives , Standards , Consequences , universities , conflict of interest , History , ethical perspective , engineers , Privacy , intellectual property , Policies , public involvement , responsibilites , scientists , private sector , government
Journal title
Proceedings of the IEEE
Serial Year
2003
Journal title
Proceedings of the IEEE
Record number
99744
Link To Document