Analysis on various factors affecting the biometrics authentication
M Ephin, J Udhayan… - 2012 1st International …, 2012 - ieeexplore.ieee.org
M Ephin, J Udhayan, NA Vasanthi
2012 1st International Conference on Recent Advances in …, 2012•ieeexplore.ieee.orgMany authentication schemes are being strategized which at least involves minimum two
authentication procedures. For instance many multi Factor Based authentication implies that
simply authentication mechanism is not sufficient, either serial or parallel implementation of
few or best of them is necessary. However many authentication schemes become a success
in one case may terribly fail in another. Authentication schemes effectively used by certain
set of users are completely ignored or bypassed by another set of users. Hence to have an …
authentication procedures. For instance many multi Factor Based authentication implies that
simply authentication mechanism is not sufficient, either serial or parallel implementation of
few or best of them is necessary. However many authentication schemes become a success
in one case may terribly fail in another. Authentication schemes effectively used by certain
set of users are completely ignored or bypassed by another set of users. Hence to have an …
Many authentication schemes are being strategized which at least involves minimum two authentication procedures. For instance many multi Factor Based authentication implies that simply authentication mechanism is not sufficient, either serial or parallel implementation of few or best of them is necessary. However many authentication schemes become a success in one case may terribly fail in another. Authentication schemes effectively used by certain set of users are completely ignored or bypassed by another set of users. Hence to have an effective authentication procedure, requirement analysis for authentication has to be done ahead of identifying the schemes. Therefore this work strives to find out the trade-off of various factors that affect the authentication procedure and schemes through analyzing the universal behavior of the users and threats.
ieeexplore.ieee.org
Showing the best result for this search. See all results