Barkadehi, Mohammadreza Hazhirpasand and Nilashi, Mehrbaksh and Ibrahim, Othman and Fardi, Ali Zakeri and Samad, Sarminah (2018) Authentication systems: a literature review and classification. Telematics and Informatics, 35 (5). pp. 1495-1511. ISSN 0736-5853
Full text not available from this repository.
Official URL: https://doi.org/10.1016/j.tele.2018.03.018
Abstract
One of the most important parts of any system is authentication. Appreciated as the first and the last line of defense in the great majority of cases, authentication systems can usually prevent the kleptomaniac from unauthorized accessing to users’ data. However, the traditional text-based password is still used in many websites and applications which are vulnerable to different kinds of attacks. Accordingly, there exist some other alternative ways to boost this traditional method. In this study, we classified and identified different types of authentication systems in a variety of platforms. Their usage, similarity, usability, performance and drawbacks were discussed. The goal of this study is to provide useful, classified information with the aim of understanding of how different authentication systems work and of what their usability and drawbacks are to the readers.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | login systems, security |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Computing |
ID Code: | 84209 |
Deposited By: | Siti Nor Hashidah Zakaria |
Deposited On: | 16 Dec 2019 03:20 |
Last Modified: | 16 Dec 2019 03:20 |
Repository Staff Only: item control page