Special featureBiometrics, is it a viable proposition for identity authentication and access control?
References (26)
- et al.
Computer Ethics: Cautionary tales and ethical dilemmas in computing
(1994) Computer Security and Information Integrity
(1991)- et al.
Information Systems Management: Opportunities and Risks
(1991) Bometrics Futures
The Right Look Can Open Doors
- et al.
Firewalls and Internet Security: Repelling the Wily Hacker
Addison-Wesley Professional Computing Series
(1994) Vital Signs of Identity
EEE Spectrum
(Feb 1994)The underpinning of privacy protection
Communications of the ACM
(Aug 1993)Information Technology and Dataveillance
Communications of the ACM
(May 1988)
Identity Authentication Based on Keystroke Latencies
Communications of the ACM
An Introduction to Speech and Speaker Recognition
IEEE Computer
Cited by (31)
Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment
2018, Decision Support SystemsCitation Excerpt :There are few theoretically grounded studies that focus on the determinants of users' perceptions of biometrics authentication. Most extant literature provides descriptions of biometrics technologies, its architecture or viability [38]. Today, biometrics technology seemingly enjoys a wider acceptance due to the inclusion of fingerprint biometrics and more user-friendly applications on mobile devices.
One-time password authentication scheme based on the negative database
2017, Engineering Applications of Artificial IntelligenceCitation Excerpt :Thus far, many one-time password authentication schemes have been proposed to protect the authentication data and user password. The security of the schemes proposed in early years was primarily based on information known by the user (Joyce, 1990; Kim, 1999), such as the one-time password authentication scheme based on a one-way hash function proposed by Lamport (1981) and its improved versions (Haller, 1995; Sandirigama et al., 2000; Chen and Ku, 2002). One-time password authentication schemes using smart cards were subsequently proposed in later studies (Yang and Shieh, 1999; Liao et al., 2006; Chang and Wu, 1991; Xu et al., 2009; Wu et al., 2012).
Hierarchy of users' web passwords: Perceptions, practices and susceptibilities
2014, International Journal of Human Computer StudiesCitation Excerpt :Maintaining a unique identity of this type typically requires remembering a unique username and a password for that site, much like the authentication procedures on more security-sensitive sites, such as those for banking, stock trading, email, and online social networks. Advances in technology and design have led to various other forms of user authentication, such as biometrics (Roddy and Stosz, 1997; Marino et al., 2006; Kim, 1995), graphical passwords (Goldberg et al., 2002; Brostoff and Sasse, 2000; Wiedenbeck et al., 2005b), and token-based authentication (Corner and Noble, 2002; Syta et al., 2010). Still, password-based authentication remains the most popular due to its simplicity and cost effectiveness.
A password authentication scheme over insecure networks
2006, Journal of Computer and System SciencesAlternative method for unique RSA primes generation
2001, Computers and SecurityBiometric standard for information management and security
2000, Computers and Security