An Experimental Comparison of Secret-Based User Authentication Technologies
Publication: Information Management and Computer Security, Volume 10, Number 3
Page(s): 100 - 108
Publisher: Emerald Group Publishing Limited
Source 1: http://www.emeraldinsight.com/doi/abs/10.1108/09685220210431854 - Subscription or payment required
Abstract or Summary:
The paper presents a comparative study of software-based user authentication techniques, contrasting the use of traditional password and personal identifier numbers (PIN) against alternative methods involving question and answer responses and graphical representation. All methods share the common basis of some secret knowledge and rely upon the userís ability to recall it in order to achieve authentication. An experimental trial is described, along with the results based upon 27 participants. The alternative methods are assessed in terms of practical effectiveness (in this context relating to the participantís ability to authenticate themselves a significant time after initial use of the methods), as well as the perceived levels of user friendliness and security that they provide. The investigation concludes that while passwords and PIN approaches garner good ratings on the basis of their existing familiarity to the participants, other methods based upon image recall and cognitive questions also achieved sufficiently positive results to suggest them as viable alternatives in certain contexts.
Do you have additional information to contribute regarding this research paper? If so, please email firstname.lastname@example.org with the details.