In the current state there are many authentication schemes and most of these suffer from many weaknesses. Some of them are based on the physical and behavioral properties of the user, and some others ...
The authors evaluate two decades of proposals to replace text passwords for general-purpose user authentication on the web using a broad set of twenty-five usability, deploy ability and security ...
Are passwords passé? A couple of weeks ago, the “Seattle Post-Intelligencer” ran an Associated Press story that described various multi-factor authentication schemes, such as password-plus-biometric ...
Despite the astronomical growth of smartphones and tablets, and the rise in applications allowing consumers to purchase both virtual and real goods from their mobile devices, mobile commerce still ...
Authentication is a mechanism that verifies whether an entity is who it claims to be. On a Linux system, applications, such as su, passwd or login, are used to authenticate users before they are given ...
I’m still on my quest to find good user authentication techniques that can supplement or replace the old username and password scheme. In this age of spoofing, phishing and stolen IDs, we need strong ...
Driven by integrated functionality and shrinking form factors, the demand for portable devices such as the cellular phone, PDA and DVD player has been growing significantly for the last few years.