EFFECTIVENESS OF VARIOUS USER AUTHENTICATION TECHNIQUES
Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.5, No. 12)Publication Date: 2014-12-29
Authors : NIMISHA PAULOSE; SARIKA S;
Page : 142-147
Keywords : computer engineering; cloud computing; network security; wireless communication; iaeme journals; IJCET; journal article; research paper; open access journals; journal publication;
Abstract
Text passwords are the most popular form of user authentication on the internet due to simplicity of t he passwords. The internet users are required to remember many passwords to access their online accounts. These user passwords are prone to be stolen and compromised under different vulnerabilities. Passwords are compromised due to its simplicity of the passwords; the user select weak password that are easier to remember. The end users are not much concerned about the security issues and that’s why they go for simple passwords.
Other Latest Articles
- Efficacy of Botulinum Toxin-A Treatment in Chronic Migraine ? Kuwait Experience
- COLOR VS. TEXTURE FEATURE EXTRACTION AND MATCHING IN VISUAL CONTENT RETRIEVAL BY USING GLOBAL COLOR HISTOGRAM
- NVRAM APPLICATIONS IN THE ARCHITECTURAL REVOLUTIONS OF MAIN MEMORY IMPLEMENTATION ? A MEMRISTOR WALKTHROUGH
- Behavioral Health of Dementia Patients in Long-term Care: Evaluation of a Montessori-based Program
- IMPACT OF ELECTRONIC COMMERCE IN MARKETING AND BRAND DEVELOPING
Last modified: 2016-08-09 21:06:10