A Survey of Alternative Authentication Methods
Robert Rittenhouse, Junaid Chaudhry
Available Online November 2015.
- https://doi.org/10.2991/racs-15.2016.31How to use a DOI?
- user authentication; biometrics; graphical passwords; client certificates
- The traditional and most common authentication method employs usernames and passwords composed of alphanumeric text possibly combined with some symbols. This method has proven to be insecure in practice as passwords that can resist attack are difficult or impossible for users to remember. This paper includes a survey of alternative authentication methods and their possible application areas and describe an authentication system in common use in Korea that combines multiple authentication methods.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Robert Rittenhouse AU - Junaid Chaudhry PY - 2015/11 DA - 2015/11 TI - A Survey of Alternative Authentication Methods BT - International Conference on Recent Advances in Computer Systems PB - Atlantis Press SN - 2352-538X UR - https://doi.org/10.2991/racs-15.2016.31 DO - https://doi.org/10.2991/racs-15.2016.31 ID - Rittenhouse2015/11 ER -