IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 5 - Issue 10, November 2016 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Review Of Authentication Methods

[Full Text]

 

AUTHOR(S)

Nilesh A. Lal, Salendra Prasad, Mohammed Farik

 

KEYWORDS

authentication, biometrics, password, smart card, vulnerabilities

 

ABSTRACT

Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms password entry, smart card, and biometric. Each authentication mechanism functions differently and has their strengths and weakness. In this paper we review different types of authentication mechanisms, their vulnerabilities, and recommend novel solutions.

 

REFERENCES

[1] Webopedia, "Authentication," 2016. [Online]. Available: http://www.webopedia.com/TERM/A/authentication.html. [Accessed 1 Oct 2016].

[2] H. Abie, "semanticscholar," 12 12 2006. [Online]. Available: https://pdfs.semanticscholar.org/3733/2607f7a7ac8284c514845957fd00583e5614.pdf. [Accessed 1 October 2016].

[3] Wikipedia, "Social engineering (security)," [Online]. Available: https://en.wikipedia.org/wiki/Social_engineering_(security). [Accessed 1 October 2016].

[4] M. Farik, "Algorithm to Ensure and enforce Brutce force attack resilient password in routers," Algorithm to Ensure and enforce Brutce force attack resilient password in routers, vol. 4, no. 10, p. 5, 2015.

[5] wikipedia, "Multi-factor authentication," 2005. [Online]. Available: https://en.wikipedia.org/wiki/Multi-factor_authentication. [Accessed 1 October 2016].

[6] B. Schneier, "Schneier on Security," 2010. [Online]. Available: https://www.schneier.com/blog/archives/2010/02/man-in-the-midd_1.html. [Accessed 1 October 2016].

[7] M. McDowell, "US-CERT," 22 October 2009. [Online]. Available: https://www.us-cert.gov/ncas/tips/ST04-014. [Accessed 3 October 2016].

[8] bioelectronix, "Biometric Security," [Online]. Available: http://www.bioelectronix.com/what_is_biometrics.html. [Accessed 1 October 2016].

[9] H. Spector, "Techwalla," 2016. [Online]. Available: https://www.techwalla.com/articles/what-are-the-advantages-disadvantages-of-a-digital-certificate. [Accessed 1 October 2016].