2018
DOI: 10.1016/j.tele.2018.03.018
|View full text |Cite
|
Sign up to set email alerts
|

Authentication systems: A literature review and classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 70 publications
(46 citation statements)
references
References 48 publications
0
37
0
Order By: Relevance
“…Using the tested cases (i.e.30 students), the proposed system claims to have more than 99% accuracy rate. As for the failed cases (2,3,4), it can be solved by using another fingerprint from the user's hand. In case all user's fingerprint are failed to be registered in the proposed system, the pass can be traditionally using the user's password.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Using the tested cases (i.e.30 students), the proposed system claims to have more than 99% accuracy rate. As for the failed cases (2,3,4), it can be solved by using another fingerprint from the user's hand. In case all user's fingerprint are failed to be registered in the proposed system, the pass can be traditionally using the user's password.…”
Section: Resultsmentioning
confidence: 99%
“…Identity authentication considered a topic of interest in the recent years, while increasing the need for more reliable and useful identity authentication systems for security [1]. The old traditional authentication systems depend on using passwords or ID cards found to be less reliable [2]. Indeed, the traditional authentication systems are not able to recognize the original person from the cheater using the password [1].…”
Section: Related Workmentioning
confidence: 99%
“…Partly, because of the rapid pace of technology innovation in the domain, ever changing regulatory guidelines and the importance of identity management for the functioning of societies. These are exemplified in the following works: classification of authentication systems and their usability and drawbacks [9], survey of existing authentication methods [10], framework for recommendation of authentication schemes [11] and a review of authentication using behavioral biometrics [12]. Literature reviews on identity management have been done from various perspectives, such as surveys in the context of Internet of Things [13], authentication for e-government services [14], on privacy preservation [15] and strategies [16], identity and access management in cloud environments [17].…”
Section: Related Literaturementioning
confidence: 99%
“…For example, the solution in paper * [9] requires integrations with additional backend nodes and push message services (changes to legacy infrastructure -TRUE), implies a greater dependence on Certificate Authorities apart from a trusted IDP (existence of a trusted third party institution -TRUE). The authors also state that, "The private key SK never leaves the [IdM wallet app]", which implies an increased user responsibility (TRUE).…”
Section: Assumptions Extraction and Synthesismentioning
confidence: 99%
See 1 more Smart Citation