|
|
1 | (36) |
|
|
2 | (1) |
|
Types of Authentication Approaches |
|
|
3 | (1) |
|
|
3 | (14) |
|
|
17 | (4) |
|
|
21 | (7) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (5) |
|
|
35 | (2) |
|
2 Biometric Authentication |
|
|
37 | (48) |
|
|
38 | (2) |
|
Different Biometric Modalities |
|
|
40 | (2) |
|
Biometric Authentication Process |
|
|
42 | (3) |
|
Performance Measures of Biometric Systems |
|
|
45 | (1) |
|
False Acceptance Rate (FAR) |
|
|
45 | (1) |
|
False Rejection Rate (FRR) |
|
|
45 | (1) |
|
|
46 | (1) |
|
Failure to Enroll Rate (FTE) |
|
|
47 | (1) |
|
Failure to Acquire Rate (FTA) |
|
|
47 | (1) |
|
Details of Biometric Authentication Modalities |
|
|
47 | (1) |
|
|
47 | (2) |
|
|
49 | (2) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (2) |
|
Voice (Speaker) Recognition |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
57 | (4) |
|
|
61 | (1) |
|
Applications of Biometrics |
|
|
61 | (2) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
Limitations of Biometric Systems |
|
|
66 | (1) |
|
|
67 | (2) |
|
Attacks on Biometric-Based Authentication Systems |
|
|
69 | (2) |
|
Mitigating Different Attacks on Biometric Systems |
|
|
71 | (1) |
|
Liveness Detection Mechanisms |
|
|
71 | (1) |
|
Steganographic and Watermarking Techniques |
|
|
71 | (1) |
|
Challenge-Response Systems |
|
|
72 | (1) |
|
Multimodal Biometric Systems |
|
|
73 | (2) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (2) |
|
|
79 | (3) |
|
|
82 | (3) |
|
3 Negative Authentication Systems |
|
|
85 | (62) |
|
|
86 | (1) |
|
Concept of Negative Authentication |
|
|
87 | (3) |
|
|
90 | (5) |
|
Implementation of Negative Authentication System (NAS) |
|
|
95 | (48) |
|
|
143 | (1) |
|
|
144 | (3) |
|
4 Pseudo-Passwords and Non-textual Approaches |
|
|
147 | (38) |
|
Evolution of Hash Functions |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (6) |
|
NLEs from the n-Gram Model Concept |
|
|
156 | (1) |
|
NLEs from the PCFG Model Concept |
|
|
157 | (1) |
|
Encoding or Decoding of the Sub-grammar (SG) |
|
|
158 | (1) |
|
|
158 | (1) |
|
Evaluating Single Passwords |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
Constructing Bloom Filters |
|
|
162 | (2) |
|
Comparison of Complementary Approaches: NAS (G-NAS, GM-NAS), Honeywords, and Bloom Filter |
|
|
164 | (1) |
|
|
165 | (2) |
|
Recognition-Based Techniques |
|
|
167 | (4) |
|
|
171 | (4) |
|
Security Aspects and Possible Attacks on Graphical Passwords |
|
|
175 | (4) |
|
|
179 | (1) |
|
|
180 | (5) |
|
5 Multi-Factor Authentication |
|
|
185 | (50) |
|
|
186 | (2) |
|
Issues of Single-Factor Authentication (SFA) |
|
|
188 | (1) |
|
Two-Factor-Based Authentication |
|
|
188 | (2) |
|
Different Authentication Factors Considered in MFA |
|
|
190 | (1) |
|
Necessity to Move Toward MFA |
|
|
191 | (1) |
|
Different Characteristics of a Good MFA |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
193 | (3) |
|
Fast Identity Online (FIDO) |
|
|
196 | (2) |
|
Universal Authentication Framework (UAF) |
|
|
198 | (1) |
|
Universal Second Factor (U2F) |
|
|
198 | (1) |
|
|
198 | (2) |
|
MFA Authentication Products |
|
|
200 | (1) |
|
|
201 | (2) |
|
|
203 | (2) |
|
Vasco IDENTIKEY Authentication Server 3.8 |
|
|
205 | (1) |
|
|
206 | (4) |
|
Symantec Validation and ID Protection Service (VIP) |
|
|
210 | (3) |
|
|
213 | (2) |
|
SafeNet Authentication Service |
|
|
215 | (2) |
|
|
217 | (2) |
|
|
219 | (2) |
|
|
221 | (1) |
|
|
222 | (2) |
|
Comparison of Various MFA Products |
|
|
224 | (1) |
|
|
224 | (6) |
|
|
230 | (5) |
|
6 Continuous Authentication |
|
|
235 | (46) |
|
|
236 | (1) |
|
Continuous/Active Authentication |
|
|
236 | (2) |
|
Characteristics of a Good Continuous Authentication System |
|
|
238 | (1) |
|
Steps to Design Continuous Authentication System |
|
|
239 | (1) |
|
Attribute Selection for Continuous Authentication System |
|
|
239 | (1) |
|
Unimodal Continuous Authentication |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (3) |
|
Dynamic Context Fingerprints |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
246 | (2) |
|
|
248 | (2) |
|
|
250 | (1) |
|
Hand Movement, Orientation, and Grasp (HMOG) |
|
|
251 | (2) |
|
Multi-modal Continuous Authentication |
|
|
253 | (1) |
|
Keystroke and Mouse Movement, Application Usage, and System Footprint |
|
|
253 | (3) |
|
Active Authentication for Mobile Devices |
|
|
256 | (2) |
|
Stylometry, Application Usage, Web Browsing, and GPS Location |
|
|
258 | (1) |
|
Multi-sensor Text-Based Biometric |
|
|
259 | (2) |
|
Gestures, Keystroke, Touch, and Body Movements |
|
|
261 | (1) |
|
Keystroke, Mouse Movement, Stylometry, Web Browsing Behavior |
|
|
262 | (1) |
|
Smartphone-Based Multi-sensor Authentication |
|
|
263 | (3) |
|
Continuous Authentication for Internet of Things (IoT) |
|
|
266 | (1) |
|
Self-authenticable Approaches for Wearable Devices |
|
|
267 | (2) |
|
The National Strategy for Trusted Identities in Cyberspace (NSTIC) |
|
|
269 | (4) |
|
|
273 | (2) |
|
|
275 | (6) |
|
7 Adaptive Multi-factor Authentication |
|
|
281 | (72) |
|
|
282 | (1) |
|
Adaptive-MFA (A-MFA) Framework |
|
|
283 | (2) |
|
|
285 | (1) |
|
Considered Surrounding Conditions for MFA |
|
|
285 | (3) |
|
Trustworthy Framework for Authentication Factors |
|
|
288 | (1) |
|
|
288 | (4) |
|
|
292 | (14) |
|
Adaptive Selection Approach for MFA |
|
|
306 | (5) |
|
Implementation of Adaptive-MFA System |
|
|
311 | (1) |
|
Surrounding Conditions (Light and Noise) |
|
|
312 | (1) |
|
Database to Store Authentication Factors |
|
|
313 | (1) |
|
Configuration of A-MFA System |
|
|
314 | (2) |
|
|
316 | (20) |
|
Experimental Results of the A-MFA System |
|
|
336 | (1) |
|
Creation of Synthetic Dataset |
|
|
336 | (2) |
|
System Evaluation Criteria |
|
|
338 | (1) |
|
|
338 | (4) |
|
Comparison of Adaptive Selection Approach with Random and Only Biometric-Based Approaches |
|
|
342 | (3) |
|
Advantage over Other Existing MFA Approaches |
|
|
345 | (2) |
|
|
347 | (3) |
|
|
350 | (3) |
References |
|
353 | (5) |
Service Part |
|
Index |
|
358 | |