-
928 Accesses
-
1 Citation
Related Concepts
Background
The Computer Security Guidelines for Implementing the Privacy Act of 1974 (FIPS PUB 41) was the first to mention the characterization of the three factors of authentication. Carlton et al. discussed the strengths and weaknesses of these factors in detail. The authors divided the tests to authenticate a user to: (1) things that the user knows, (2) things that the user has, (3) and things that the user is.
Applications
Passwords are the most common example of the first type of authentication factors. A password is a secret information that only the authorized person knows. A password can also include a...
This is a preview of subscription content, log in via an institution to check access.
Access this chapter
Subscribe and save
- Starting from 10 chapters or articles per month
- Access and download chapters and articles from more than 300k books and 2,500 journals
- Cancel anytime
Buy Now
- Chapter
-
JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 100099
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Burr WE, Dodson DF, Timothy Polk W (2006) Electronic authentication guideline. NIST Special Publication 800–863, National Institute of Standards and Technology, Gaithersburg, USA
Carlton SF, Taylor JW, Wyszynski JL (1988) Alternate authentication mechanisms. In: Proceedings of the eleventh national computer security conference, Baltimore, MD, pp 333–338
Cope BJB (1990) Biometric systems of access control. Electrotechnology 18(2):71–74
England DM (1988) Zodiac: personal identification by signature. Computer Bulletin 4:33–34
Farrow R (1991) UNIX system security. Addison-Wesley, Reading, MA
Lobel J (1986) Foiling the system breakers: computer security and access control. McGraw-Hill, New York
Luby M, Racko C (1989) A study of password security. J Cryptol 1(3):151–158
Norman ARD (1983) Computer insecurity. Chapman and Hall, London
Rankl W, Effing W (2010) Smart card handbook, 4th edn. Wiley, Chichester, UK
Smith RE (2002) Authentication: from passwords to public keys. Addison-Wesley, Reading, MA
Spaord EH, Weeber SA (1991) User authentication and related topics: an annotated bibliography. Technical report CSD–TR–91–086, Purdue University
Vielhauer C (2006) Biometric user authentication for IT security: from fundamentals to handwriting, vol 18 of Advances in information security, chapter 4. Springer, New York, pp 77–115
Editor information
Editors and Affiliations
Department of Mathematics and Computing Science, Eindhoven University of Technology, 5600 MB, Eindhoven, The Netherlands
Henk C. A. van Tilborg
Center for Secure Information Systems, George Mason University, Fairfax, VA, 22030-4422, USA
Sushil Jajodia
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Abu-Nimeh, S. (2011). Three-Factor Authentication. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_793
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_793
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer Science Reference Module Computer Science and Engineering
Share this entry
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative