Password-Based Authentication and The Experiences of End Users.
Assumpta EzugwuElochukwu A. UkwanduCelestine UgwuModesta EzemaComfort OlebaraJuliana NdunaguLizzy OfusoriUchenna OmePublished in: CoRR (2023)
Keyphrases
- end users
- user authentication
- authentication protocol
- security analysis
- application development
- key agreement
- user experience
- smart card
- user interface
- case study
- key exchange
- authentication scheme
- public key
- web applications
- key exchange protocol
- service providers
- user driven
- user requirements
- user friendliness
- biometric systems
- security protocols
- search tools
- information security
- internet users
- security requirements
- artificial intelligence
- business intelligence
- lightweight
- knowledge discovery
- search engine