Evaluating current authentication methods: Prediction of a more suitable authentication approach for public interaction

The trend in information technology is towards achieving ubiquitous service rendering where barriers (geographical, time) in getting information related services will be eliminated. A good example of this is the ATM machines used by banks for public banking services, the likes in other sectors are...

Full description

Saved in:
Bibliographic Details
Main Authors: R. G., Jimoh, Shiratuddin, Norshuhada
Format: Conference or Workshop Item
Language:English
Published: 2009
Subjects:
Online Access:http://repo.uum.edu.my/13475/1/PID60.pdf
http://repo.uum.edu.my/13475/
http://www.icoci.cms.net.my
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uum.repo.13475
record_format eprints
spelling my.uum.repo.134752015-04-01T03:44:09Z http://repo.uum.edu.my/13475/ Evaluating current authentication methods: Prediction of a more suitable authentication approach for public interaction R. G., Jimoh Shiratuddin, Norshuhada QA76 Computer software The trend in information technology is towards achieving ubiquitous service rendering where barriers (geographical, time) in getting information related services will be eliminated. A good example of this is the ATM machines used by banks for public banking services, the likes in other sectors are currently on the way.This paper explores the user’s perception on the current identity authentication (Token-based and Knowledgebased) with a view to predict a more secured authentication for authentication in public places.A survey study is conducted so as to justify the claims of the previous authors on the need to migrate from the conventional knowledge-based and tokenbased authentication methods to a more secured biometric authentication approach which makes impossible user’s impersonation, and thus minimizing fraud, particularly in business transactions.Also, biometrical identification was also reviewed with respect to the all known biometric identifiers where human iris data was revealed to be the best human trait that can be used for identification/authentication purposes in public zones 2009-06-24 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/13475/1/PID60.pdf R. G., Jimoh and Shiratuddin, Norshuhada (2009) Evaluating current authentication methods: Prediction of a more suitable authentication approach for public interaction. In: International Conference on Computing and Informatics 2009 (ICOCI09), 24-25 June 2009, Legend Hotel, Kuala Lumpur. http://www.icoci.cms.net.my
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
R. G., Jimoh
Shiratuddin, Norshuhada
Evaluating current authentication methods: Prediction of a more suitable authentication approach for public interaction
description The trend in information technology is towards achieving ubiquitous service rendering where barriers (geographical, time) in getting information related services will be eliminated. A good example of this is the ATM machines used by banks for public banking services, the likes in other sectors are currently on the way.This paper explores the user’s perception on the current identity authentication (Token-based and Knowledgebased) with a view to predict a more secured authentication for authentication in public places.A survey study is conducted so as to justify the claims of the previous authors on the need to migrate from the conventional knowledge-based and tokenbased authentication methods to a more secured biometric authentication approach which makes impossible user’s impersonation, and thus minimizing fraud, particularly in business transactions.Also, biometrical identification was also reviewed with respect to the all known biometric identifiers where human iris data was revealed to be the best human trait that can be used for identification/authentication purposes in public zones
format Conference or Workshop Item
author R. G., Jimoh
Shiratuddin, Norshuhada
author_facet R. G., Jimoh
Shiratuddin, Norshuhada
author_sort R. G., Jimoh
title Evaluating current authentication methods: Prediction of a more suitable authentication approach for public interaction
title_short Evaluating current authentication methods: Prediction of a more suitable authentication approach for public interaction
title_full Evaluating current authentication methods: Prediction of a more suitable authentication approach for public interaction
title_fullStr Evaluating current authentication methods: Prediction of a more suitable authentication approach for public interaction
title_full_unstemmed Evaluating current authentication methods: Prediction of a more suitable authentication approach for public interaction
title_sort evaluating current authentication methods: prediction of a more suitable authentication approach for public interaction
publishDate 2009
url http://repo.uum.edu.my/13475/1/PID60.pdf
http://repo.uum.edu.my/13475/
http://www.icoci.cms.net.my
_version_ 1644281194254172160
score 13.144533