2015
DOI: 10.5539/cis.v8n3p155
|View full text |Cite
|
Sign up to set email alerts
|

Authentication systems: principles and threats

Abstract: Identity manipulation is considered a serious security issue that has been enlarged with the spread of automated systems that could be accessed either locally or remotely. Availability, integrity, and confidentiality represent the basic requirements that should be granted for successful authentication systems. Personality verification has taken multiple forms depending on different possession types. They are divided into knowledge based, token based, and biometric based authentication. The permanent ownership … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 110 publications
(106 reference statements)
0
2
0
Order By: Relevance
“…after a short idle timeout) and users have to unlock them before usage. While authentication conceptually is divided into knowledge-, biometrics-, and token based-authentication [5], [6], so far approaches for mobile devices mostly utilize either knowledge-or biometrics-based authentication.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…after a short idle timeout) and users have to unlock them before usage. While authentication conceptually is divided into knowledge-, biometrics-, and token based-authentication [5], [6], so far approaches for mobile devices mostly utilize either knowledge-or biometrics-based authentication.…”
Section: Introductionmentioning
confidence: 99%
“…Apple TouchID), face, or voice (cf. [5], [20]). While those are easy to use and do not increase the cognitive load, the drawback lies with securing biometrics of users.…”
Section: Introductionmentioning
confidence: 99%