Comparing passwords, tokens, and biometrics for user authentication.
Lawrence O'GormanPublished in: Proc. IEEE (2003)
Keyphrases
- user authentication
- authentication systems
- biometric authentication
- keystroke dynamics
- biometric systems
- authentication scheme
- security analysis
- biometric recognition
- information security
- authentication protocol
- identity verification
- remote user authentication scheme
- personal identification
- palmprint
- biometric data
- image processing
- data mining