ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

EFFECTIVENESS OF VARIOUS USER AUTHENTICATION TECHNIQUES

Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.5, No. 12)

Publication Date:

Authors : ; ;

Page : 142-147

Keywords : computer engineering; cloud computing; network security; wireless communication; iaeme journals; IJCET; journal article; research paper; open access journals; journal publication;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Text passwords are the most popular form of user authentication on the internet due to simplicity of t he passwords. The internet users are required to remember many passwords to access their online accounts. These user passwords are prone to be stolen and compromised under different vulnerabilities. Passwords are compromised due to its simplicity of the passwords; the user select weak password that are easier to remember. The end users are not much concerned about the security issues and that’s why they go for simple passwords.

Last modified: 2016-08-09 21:06:10