期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
印刷版ISSN:2277-6451
电子版ISSN:2277-128X
出版年度:2012
卷号:2
期号:6
出版社:S.S. Mishra
摘要:The purpose of this paper is to study about the various methods, which are mainly used in the authentication area. Information technology (IT) systems, their stored data and the processes are valuable resources, which need to be protected from outer world. First step toward securing an IT system is the ability to verify the identity of its users. The process of verifying a user's identity is typically referred to as user identification and authentication. Passwords are the methods that were used most often for authenticating computer users, but this approach has often proven inadequate in preventing unauthorized access to computer resources when used as the sole means of authentication. Because of above discussed problem, a new technique was emerged by researchers that can significantly improve the protection afforded by password-only authentication i.e. Biometrics Recognition