Academia.eduAcademia.edu

Outline

Authentication Practices from Passwords to Biometrics

2015, Encyclopedia of Information Science and Technology, Third Edition

https://doi.org/10.4018/978-1-4666-5888-2.CH417

Abstract
sparkles

AI

With the increasing prevalence of mobile devices and networked systems, the demand for secure authentication practices is growing. This article reviews three primary user authentication approaches: knowledge-based (like passwords), possession-based, and biometrics-based methods. It discusses the effectiveness, ease of implementation, and user acceptance of these strategies, emphasizing the importance of ensuring both organizational and personal data security against unauthorized access.

References (6)

  1. This title is available in InfoSci-Books, InfoSci-Computer Science and Information Technology, Science, Engineering, and Information Technology, InfoSci-Select, InfoSci-Select, InfoSci-Select, InfoSci-Select, InfoSci-Select, InfoSci-Select. Recommend this product to your librarian: www.igi-global.com/e-resources/library-recommendation/?id=1
  2. Reyes Delgado Paola Yuritzy, Mora Tavarez José Manuel, Duran-Limon Hector Alejandro, Rodríguez- Martínez Laura Cecilia, Mendoza González Ricardo and Rodríguez Díaz Mario Alberto (2015). Encyclopedia of Information Science and Technology, Third Edition (pp. 7359-7370). www.igi-global.com/chapter/state-of-the-art-of-software-architecture-design-methods-used-in- main-software-development-methodologies/112433?camid=4v1a
  3. Computational Intelligence in Detecting Abnormal Pressure in the Diabetic Foot Linah Wafai, Aladin Zayegh, Rezaul K. Begg and John Woulfe (2015). Encyclopedia of Information Science and Technology, Third Edition (pp. 5523-5533).
  4. igi-global.com/chapter/computational-intelligence-in-detecting-abnormal-pressure-in-the- diabetic-foot/113006?camid=4v1a Scientific Principles Applied to Design-Type Research (2012). Design-Type Research in Information Systems: Findings and Practices (pp. 156-178). www.igi-global.com/chapter/scientific-principles-applied-design-type/63110?camid=4v1a
  5. Twitter Intention Classification Using Bayes Approach for Cricket Test Match Played Between India and South Africa 2015
  6. Varsha D. Jadhav and Sachin N. Deshmukh (2017). International Journal of Rough Sets and Data Analysis (pp. 49-62).