Secure and Usable Bio-Passwords based on Confidence Interval

The most popular user-authentication method is the password. Many authentication systems try to enhance their security by enforcing a strong password policy, and by using the password as the first factor, something you know, with the second factor being something you have. However, a strong password...

Full description

Bibliographic Details
Main Authors: Aeyoung Kim, Geunshik Han, Seung-Hyun Seo
Format: Article
Language:English
Published: Innovative Information Science & Technology Research Group (ISYOU) 2017-02-01
Series:Journal of Internet Services and Information Security
Subjects:
Online Access:http://isyou.info/jisis/vol7/no1/jisis-2017-vol7-no1-02.pdf