Proceedings of the 2015 International Conference on Recent Advances in Computer Systems

A Survey of Alternative Authentication Methods

Authors
Robert Rittenhouse, Junaid Chaudhry
Corresponding Author
Robert Rittenhouse
Available Online November 2015.
DOI
https://doi.org/10.2991/racs-15.2016.31How to use a DOI?
Keywords
user authentication; biometrics; graphical passwords; client certificates
Abstract
The traditional and most common authentication method employs usernames and passwords composed of alphanumeric text possibly combined with some symbols. This method has proven to be insecure in practice as passwords that can resist attack are difficult or impossible for users to remember. This paper includes a survey of alternative authentication methods and their possible application areas and describe an authentication system in common use in Korea that combines multiple authentication methods.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
Part of series
Advances in Computer Science Research
Publication Date
November 2015
ISBN
978-94-6252-146-9
ISSN
2352-538X
DOI
https://doi.org/10.2991/racs-15.2016.31How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Robert Rittenhouse
AU  - Junaid Chaudhry
PY  - 2015/11
DA  - 2015/11
TI  - A Survey of Alternative Authentication Methods
PB  - Atlantis Press
SP  - 179
EP  - 182
SN  - 2352-538X
UR  - https://doi.org/10.2991/racs-15.2016.31
DO  - https://doi.org/10.2991/racs-15.2016.31
ID  - Rittenhouse2015/11
ER  -