Comparing passwords, tokens, and biometrics for user authentication.
Lawrence O'GormanPublished in: Proc. IEEE (2003)
Keyphrases
- user authentication
- authentication systems
- biometric authentication
- keystroke dynamics
- biometric systems
- authentication scheme
- security analysis
- authentication protocol
- information security
- remote user authentication scheme
- biometric recognition
- identity verification
- biometric data
- biometric identification
- graphical password
- real time
- personal identification
- information systems