首页    期刊浏览 2024年09月20日 星期五
登录注册

文章基本信息

  • 标题:Authentication systems: principles and threats
  • 本地全文:下载
  • 作者:Sarah Abdulkader ; Ayman Atia ; Mostafa-Sami Mostafa
  • 期刊名称:Computer and Information Science
  • 印刷版ISSN:1913-8989
  • 电子版ISSN:1913-8997
  • 出版年度:2015
  • 卷号:8
  • 期号:3
  • 页码:155
  • DOI:10.5539/cis.v8n3p155
  • 出版社:Canadian Center of Science and Education
  • 摘要:Identity manipulation is considered a serious security issue that has been enlarged with the spread of automated systems that could be accessed either locally or remotely. Availability, integrity, and confidentiality represent the basic requirements that should be granted for successful authentication systems. Personality verification has taken multiple forms depending on different possession types. They are divided into knowledge based, token based, and biometric based authentication. The permanent ownership to the human being has increased the chances of deploying biometrics based authentication in highly secure systems. It includes capturing the biological traits, which are physiological or behavioral, extracting the important features and comparing them to the previously stored features that belong to the claimed user. Various kinds of attacks aim to take down the basic requirements at multiple points. This paper describes different types of authentication along with their vulnerable points and threatening attacks. Then it provides more details about the biometric system structure as well as examples of distinguishing biological characteristics, organized by their locations. It shows the performance results of various biometric systems along with the deployed algorithms for different components.
国家哲学社会科学文献中心版权所有