In the current state there are many authentication schemes and most of these suffer from many weaknesses. Some of them are based on the physical and behavioral properties of the user, and some others ...
I’m still on my quest to find good user authentication techniques that can supplement or replace the old username and password scheme. In this age of spoofing, phishing and stolen IDs, we need strong ...
Are passwords passé? A couple of weeks ago, the “Seattle Post-Intelligencer” ran an Associated Press story that described various multi-factor authentication schemes, such as password-plus-biometric ...
What kind of value will a financial institution get for its investment in strong authentication? For FIs, it’s become a burning question, thanks to federal guidance that recommends they boost the ...
Have you ever come across something years old that is so dead on about a topic important to you that you can’t believe you didn’t know it existed? I felt that way when I stumbled across an excellent ...
The most common interaction with an authentication mechanism is when we type in our password to log on to a computer or website. We type in the password once, it is authenticated by the OS, then our ...