A Survey of Alternative Authentication Methods
Authors
Robert Rittenhouse, Junaid Chaudhry
Corresponding Author
Robert Rittenhouse
Available Online November 2015.
- DOI
- 10.2991/racs-15.2016.31How to use a DOI?
- Keywords
- user authentication; biometrics; graphical passwords; client certificates
- Abstract
The traditional and most common authentication method employs usernames and passwords composed of alphanumeric text possibly combined with some symbols. This method has proven to be insecure in practice as passwords that can resist attack are difficult or impossible for users to remember. This paper includes a survey of alternative authentication methods and their possible application areas and describe an authentication system in common use in Korea that combines multiple authentication methods.
- Copyright
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Robert Rittenhouse AU - Junaid Chaudhry PY - 2015/11 DA - 2015/11 TI - A Survey of Alternative Authentication Methods BT - Proceedings of the 2015 International Conference on Recent Advances in Computer Systems PB - Atlantis Press SP - 179 EP - 182 SN - 2352-538X UR - https://doi.org/10.2991/racs-15.2016.31 DO - 10.2991/racs-15.2016.31 ID - Rittenhouse2015/11 ER -