Abstract Views :130 |
PDF Views:0
Authors
Source
International Journal of Innovative Research and Development, Vol 2, No 12 (2013), Pagination:
Abstract
Effective user authentication techniques are used to protect information and system safety. Text password authentication technique is the most common computer authentication method. There are many techniques for user authentication to secure the data and information. In this paper we are theoretical analyzing some authentication techniques with their pros and cons
Keywords
graphical password, authentication, security, token, biometric
Full Text