Authentication systems: a literature review and classification

One of the most important parts of any system is authentication. Appreciated as the first and the last line of defense in the great majority of cases, authentication systems can usually prevent the kleptomaniac from unauthorized accessing to users’ data. However, the traditional text-based password...

Full description

Saved in:
Bibliographic Details
Main Authors: Barkadehi, Mohammadreza Hazhirpasand, Nilashi, Mehrbaksh, Ibrahim, Othman, Fardi, Ali Zakeri, Samad, Sarminah
Format: Article
Published: Elsevier Ltd. 2018
Subjects:
Online Access:http://eprints.utm.my/id/eprint/84209/
https://doi.org/10.1016/j.tele.2018.03.018
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.84209
record_format eprints
spelling my.utm.842092019-12-16T03:20:46Z http://eprints.utm.my/id/eprint/84209/ Authentication systems: a literature review and classification Barkadehi, Mohammadreza Hazhirpasand Nilashi, Mehrbaksh Ibrahim, Othman Fardi, Ali Zakeri Samad, Sarminah QA75 Electronic computers. Computer science One of the most important parts of any system is authentication. Appreciated as the first and the last line of defense in the great majority of cases, authentication systems can usually prevent the kleptomaniac from unauthorized accessing to users’ data. However, the traditional text-based password is still used in many websites and applications which are vulnerable to different kinds of attacks. Accordingly, there exist some other alternative ways to boost this traditional method. In this study, we classified and identified different types of authentication systems in a variety of platforms. Their usage, similarity, usability, performance and drawbacks were discussed. The goal of this study is to provide useful, classified information with the aim of understanding of how different authentication systems work and of what their usability and drawbacks are to the readers. Elsevier Ltd. 2018 Article PeerReviewed Barkadehi, Mohammadreza Hazhirpasand and Nilashi, Mehrbaksh and Ibrahim, Othman and Fardi, Ali Zakeri and Samad, Sarminah (2018) Authentication systems: a literature review and classification. Telematics and Informatics, 35 (5). pp. 1495-1511. ISSN 0736-5853 https://doi.org/10.1016/j.tele.2018.03.018
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Barkadehi, Mohammadreza Hazhirpasand
Nilashi, Mehrbaksh
Ibrahim, Othman
Fardi, Ali Zakeri
Samad, Sarminah
Authentication systems: a literature review and classification
description One of the most important parts of any system is authentication. Appreciated as the first and the last line of defense in the great majority of cases, authentication systems can usually prevent the kleptomaniac from unauthorized accessing to users’ data. However, the traditional text-based password is still used in many websites and applications which are vulnerable to different kinds of attacks. Accordingly, there exist some other alternative ways to boost this traditional method. In this study, we classified and identified different types of authentication systems in a variety of platforms. Their usage, similarity, usability, performance and drawbacks were discussed. The goal of this study is to provide useful, classified information with the aim of understanding of how different authentication systems work and of what their usability and drawbacks are to the readers.
format Article
author Barkadehi, Mohammadreza Hazhirpasand
Nilashi, Mehrbaksh
Ibrahim, Othman
Fardi, Ali Zakeri
Samad, Sarminah
author_facet Barkadehi, Mohammadreza Hazhirpasand
Nilashi, Mehrbaksh
Ibrahim, Othman
Fardi, Ali Zakeri
Samad, Sarminah
author_sort Barkadehi, Mohammadreza Hazhirpasand
title Authentication systems: a literature review and classification
title_short Authentication systems: a literature review and classification
title_full Authentication systems: a literature review and classification
title_fullStr Authentication systems: a literature review and classification
title_full_unstemmed Authentication systems: a literature review and classification
title_sort authentication systems: a literature review and classification
publisher Elsevier Ltd.
publishDate 2018
url http://eprints.utm.my/id/eprint/84209/
https://doi.org/10.1016/j.tele.2018.03.018
_version_ 1654960055830708224
score 13.160551