© The Author(s), under exclusive license to APress Media, LLC , part of Springer Nature 2021
S. BoonkrongAuthentication and Access Controlhttps://doi.org/10.1007/978-1-4842-6570-3_5

5. Biometric Authentication

Sirapat Boonkrong1  
(1)
Nakhon Ratchasima, Thailand
 

It has been explained in the previous chapter that although passwords or something you know is still the most common authentication method, they are not without problems. In other words, authentication schemes based on passwords or something you know are not considered to be highly secure anymore. This is because they are susceptible to many types of attacks such as password guessing, password dictionary, and even shoulder surfing. There have also been suggestions to create longer and more ...

Get Authentication and Access Control: Practical Cryptography Methods and Tools now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.