Proceedings of the 2015 International Conference on Recent Advances in Computer Systems 2016
DOI: 10.2991/racs-15.2016.31
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Alternative Authentication Methods

Abstract: The traditional and most common authentication method employs usernames and passwords composed of alphanumeric text possibly combined with some symbols. This method has proven to be insecure in practice as passwords that can resist attack are difficult or impossible for users to remember. This paper includes a survey of alternative authentication methods and their possible application areas and describe an authentication system in common use in Korea that combines multiple authentication methods.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…When an attacker decrypts this information into a plaintext, the attacker can use that username and password on other websites, thereby impersonating the rightful person. The attacker may gain access to important and confidential information from these websites if they do not have professional data protection standards [22,23].…”
Section: Proposed Methodsmentioning
confidence: 99%
“…When an attacker decrypts this information into a plaintext, the attacker can use that username and password on other websites, thereby impersonating the rightful person. The attacker may gain access to important and confidential information from these websites if they do not have professional data protection standards [22,23].…”
Section: Proposed Methodsmentioning
confidence: 99%
“…The most important key for the authentication process is the uniqueness of security measures, which in general can be categorized into something a user knows (password), something a user has (smart card), or something a user is (biometrics) [10][11][12][13]. Some examples of knowledgebased method, possession-based method, and biometric-based method can be found in Figure 1.…”
Section: User Authentication Methodsmentioning
confidence: 99%
“…Tennenhouse et al 9 identify authentication methods as one of the more active research topics in cybersecurity. Rittenhouse and Chaudhry 2 state that authentication methods that employ user names and passwords are the most common in cybersecurity, but in practice, as passwords with high‐security levels are difficult to remember, those methods are not secure enough.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There has been an explosion of the literature exploring the sensors, physical processes, and algorithms for performing authentication in cyber environments in recent years. For a thorough review, see Rittenhouse and Chaudhry 2 and Thandeeswaran and Durai 3 . The bulk of research on this topic focuses on finding a combination of sensors, algorithms, and protocols that would result in an authentication procedure that is simultaneously secure, low‐cost, and user‐friendly.…”
Section: Introductionmentioning
confidence: 99%