Authentication systems: a literature review and classification
One of the most important parts of any system is authentication. Appreciated as the first and the last line of defense in the great majority of cases, authentication systems can usually prevent the kleptomaniac from unauthorized accessing to users’ data. However, the traditional text-based password...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Published: |
Elsevier Ltd.
2018
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/84209/ https://doi.org/10.1016/j.tele.2018.03.018 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.84209 |
---|---|
record_format |
eprints |
spelling |
my.utm.842092019-12-16T03:20:46Z http://eprints.utm.my/id/eprint/84209/ Authentication systems: a literature review and classification Barkadehi, Mohammadreza Hazhirpasand Nilashi, Mehrbaksh Ibrahim, Othman Fardi, Ali Zakeri Samad, Sarminah QA75 Electronic computers. Computer science One of the most important parts of any system is authentication. Appreciated as the first and the last line of defense in the great majority of cases, authentication systems can usually prevent the kleptomaniac from unauthorized accessing to users’ data. However, the traditional text-based password is still used in many websites and applications which are vulnerable to different kinds of attacks. Accordingly, there exist some other alternative ways to boost this traditional method. In this study, we classified and identified different types of authentication systems in a variety of platforms. Their usage, similarity, usability, performance and drawbacks were discussed. The goal of this study is to provide useful, classified information with the aim of understanding of how different authentication systems work and of what their usability and drawbacks are to the readers. Elsevier Ltd. 2018 Article PeerReviewed Barkadehi, Mohammadreza Hazhirpasand and Nilashi, Mehrbaksh and Ibrahim, Othman and Fardi, Ali Zakeri and Samad, Sarminah (2018) Authentication systems: a literature review and classification. Telematics and Informatics, 35 (5). pp. 1495-1511. ISSN 0736-5853 https://doi.org/10.1016/j.tele.2018.03.018 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Barkadehi, Mohammadreza Hazhirpasand Nilashi, Mehrbaksh Ibrahim, Othman Fardi, Ali Zakeri Samad, Sarminah Authentication systems: a literature review and classification |
description |
One of the most important parts of any system is authentication. Appreciated as the first and the last line of defense in the great majority of cases, authentication systems can usually prevent the kleptomaniac from unauthorized accessing to users’ data. However, the traditional text-based password is still used in many websites and applications which are vulnerable to different kinds of attacks. Accordingly, there exist some other alternative ways to boost this traditional method. In this study, we classified and identified different types of authentication systems in a variety of platforms. Their usage, similarity, usability, performance and drawbacks were discussed. The goal of this study is to provide useful, classified information with the aim of understanding of how different authentication systems work and of what their usability and drawbacks are to the readers. |
format |
Article |
author |
Barkadehi, Mohammadreza Hazhirpasand Nilashi, Mehrbaksh Ibrahim, Othman Fardi, Ali Zakeri Samad, Sarminah |
author_facet |
Barkadehi, Mohammadreza Hazhirpasand Nilashi, Mehrbaksh Ibrahim, Othman Fardi, Ali Zakeri Samad, Sarminah |
author_sort |
Barkadehi, Mohammadreza Hazhirpasand |
title |
Authentication systems: a literature review and classification |
title_short |
Authentication systems: a literature review and classification |
title_full |
Authentication systems: a literature review and classification |
title_fullStr |
Authentication systems: a literature review and classification |
title_full_unstemmed |
Authentication systems: a literature review and classification |
title_sort |
authentication systems: a literature review and classification |
publisher |
Elsevier Ltd. |
publishDate |
2018 |
url |
http://eprints.utm.my/id/eprint/84209/ https://doi.org/10.1016/j.tele.2018.03.018 |
_version_ |
1654960055830708224 |
score |
13.160551 |