Comparing Authentication Systems
Date: August 1991
Publication: Proceedings of the 3rd Workshop on Computer Incident Handling
Source: Currently no known Internet copy of paper.
In this paper we consider a set of metrics for comparing different authentication scheme. We describe a model for an authentication system; unlike other models, this one is oriented towards implementation and not cryptographic properties. We compare several authentication systems within the framework of this model using as metrics the size and probability distribution of authenticators provided by the system, the ease of use, and the ease of abuse by attackers.
Do you have additional information to contribute regarding this research paper? If so, please email firstname.lastname@example.org with the details.