期刊名称:International Journal of Engineering and Computer Science
印刷版ISSN:2319-7242
出版年度:2015
卷号:4
期号:12
页码:15373-15375
DOI:10.18535/Ijecs/v4i12.46
出版社:IJECS
摘要:Authentication is considered as a significance element of security to verify user’s identity. Thereare many authentication schemes that depend on user name /password ,but they are considered weaktechniques of user authentication because they are prone to dictionary attack and man in middle attack , etc.A more secure scheme is 2 factor authentication that does not only verify the user name /password pair, butalso needs a second factor such as a token device, biometric. This paper proposes the comparative study ofdifferent two and three factor authentication techniques, that can withstand common security attacks as welland has good performance of user authentication.