Abstract
Computer users regularly enter a username and password to access a local device or remote account. Authentication is the process of using supporting evidence to corroborate an asserted identity. In contrast, identification (recognition) establishes an identity from available information without an explicit identity having been asserted—such as picking out known criminals in a crowd, or finding who matches a given fingerprint; each crowd face is checked against a list of database faces for a potential match, or a given fingerprint is tested against a database of fingerprints.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this chapter
Cite this chapter
van Oorschot, P.C. (2020). User Authentication—Passwords,Biometrics and Alternatives. In: Computer Security and the Internet. Information Security and Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-030-33649-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-33649-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33648-6
Online ISBN: 978-3-030-33649-3
eBook Packages: Computer ScienceComputer Science (R0)