It has been explained in the previous chapter that although passwords or something you know is still the most common authentication method, they are not without problems. In other words, authentication schemes based on passwords or something you know are not considered to be highly secure anymore. This is because they are susceptible to many types of attacks such as password guessing, password dictionary, and even shoulder surfing. There have also been suggestions to create longer and more ...
5. Biometric Authentication
Get Authentication and Access Control: Practical Cryptography Methods and Tools now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.