Back to Search
Start Over
Necessity of Fourth Factor Authentication with Multiple Variations as Enhanced User Authentication Technique
- Source :
- Proceedings of the Third International Conference on Computational Intelligence and Informatics ISBN: 9789811514791
- Publication Year :
- 2020
- Publisher :
- Springer Singapore, 2020.
-
Abstract
- Authentication plays a vital role in granting access to a user by any computing system. There are several existing authentication techniques used for different scenarios which include one-factor, two-factor, and three-factor authentication, where the user submits required credentials and gains access to the system. When a legitimate user is unable to provide his credentials at any point of time, the user becomes unauthenticated. At this juncture, we have proposed a fourth factor for authentication where a legitimate user can seek assistance from any of his close associates like a spouse, friend, and colleague and can gain access to the system for a single time. In this paper, we consider multiple variations of fourth-factor authentication and compare them within the framework and explore the mechanism by applying various metrics such as key size, the ease of use, time and space complexity of the algorithms, and security considerations.
Details
- Database :
- OpenAIRE
- Journal :
- Proceedings of the Third International Conference on Computational Intelligence and Informatics ISBN: 9789811514791
- Accession number :
- edsair.doi...........5d44698e5e148768336f42a95dfcd5f1
- Full Text :
- https://doi.org/10.1007/978-981-15-1480-7_41