Abstract
AbstractAn authentication process is a process of verifying an entity’s identity based on one or multiple factors. A factor can be something the entity is, possesses, or knows. Depending on the number of credentials (or factors) required, the authentication process is referred to as single-factor authentication, two-factor authentication, or multifactor authentication. In choosing a particular authentication solution for organizations, it is crucial to balance security, usability, cost, and privacy considerations. The authentication solution for a particular service can be predetermined for the private individual, although stronger authentication can be enabled if desired. While these trends suggest a more secure and user-friendly authentication process, they may also introduce new privacy concerns that must be addressed.
Publisher
Springer Nature Switzerland
Reference27 articles.
1. EbruCelikel Cankaya. Authentication. In Henk C. A. van Tilborg and Sushil Jajodia, editors, Encyclopedia of Cryptography and Security, pages 61–62. Springer US, Boston, MA, 2011.
2. Aleksandr Ometov, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev, Tommi Mikkonen, and Yevgeni Koucheryavy. Multi-factor authentication: A survey. Cryptography, 2(1):1, 2018. Publisher: MDPI.
3. Dipankar Dasgupta, Arunava Roy, and Abhijit Nag. Advances in User Authentication. Infosys Science Foundation Series. Springer International Publishing, Cham, 2017.
4. Passwords — Strengths and Weaknesses. https://www.garykessler.net/library/password.html.
5. Okta Inc. The State of Zero Trust Security 2021. Technical report, June 2021.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献