Survey of user authentication mechanisms
Approved for public release; distribution is unlimited === The use of a password as the only traditional user authentication mechanism has been criticized for its weakness in computer security. One problem is for the user to select short, easy to remember passwords. Another problem is the selection...
Main Author: | Magno, Marianna B. |
---|---|
Other Authors: | Haga, William J. |
Language: | en_US |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Online Access: | http://hdl.handle.net/10945/9046 |
Similar Items
-
Strong user authentication mechanisms
by: Haraldsson, Emil
Published: (2005) -
An Anti-Phishing User Authentication Mechanism
by: Shun-Shyan Chang, et al.
Published: (2010) -
An efficient brainwave based user authentication mechanism
by: LU,YI-SHUN, et al.
Published: (2018) -
User Authentication Mechanisms for Remote Education Systems
by: Ekaterina Yurievna Gourina, et al.
Published: (2013-02-01) -
A Survey of User Authentication Based on Channel State Information
by: Zhengjie Wang, et al.
Published: (2021-01-01)