Name: | Description: | Size: | Format: | |
---|---|---|---|---|
647.78 KB | Adobe PDF |
Advisor(s)
Abstract(s)
In information systems, authentication involves, traditionally, sharing a secret with the authenticating entity and presenting it whenever a confirmation of the user’s identity is needed.
In the digital era, that secret is commonly a user name and password pair and/or, sometimes, a biometric feature. Both present difficulties of different kinds once the traditional user name and password are no longer enough to protect these infrastructures, the privacy of those who use it, and the confidentiality
of the information, having known vulnerabilities, and the second has many issues related to ethical and social
implications of its use. This chapter discusses two behavior biometric technologies.
Description
Keywords
Security Biometrics
Citation
Tenreiro de Magalhães, S., Santos, H. M., dos Santos, L. D., & Revett, K. (2009). Keystroke Dynamics and Graphical Authentication Systems. In M. Khosrow-Pour (Ed.), Encyclopedia of Information Science and Technology, Second Edition (pp. 2313-2318). Hershey, PA: Information Science Reference. doi:10.4018/978-1-60566-026-4.ch366
Publisher
IGI Global