Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Possession-Based Authentication

Encyclopedia of Information Science and Technology, Second Edition
An authentication based on what the user has, such as memory cards and smart card tokens. Possession-based authentication is also referred to as token-based authentication.
Published in Chapter:
Authentication Methods for Computer Systems Security
Zippy Erlich (The Open University of Israel, Israel) and Moshe Zviran (Tel-Aviv University, Israel)
DOI: 10.4018/978-1-60566-026-4.ch049
Abstract
With the rapid growth of networked systems and applications such as e-commerce, the demand for effective computer security is increasing. Most computer systems are protected through a process of user identification and authentication. While identification is usually non-private information provided by users to identify themselves and can be known by system administrators and other system users, authentication provides secret, private user information which can authenticate their identity. There are various authentication approaches and techniques, from passwords to public keys (Smith, 2002). This article presents the three main authentication approaches, their technology and implementation issues, and the factors to be considered when choosing an authentication method.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Authentication Practices from Passwords to Biometrics
Authentication mechanism based on what the user has, such as memory cards and smart card tokens. Possession-based authentication is also referred to as token-based authentication.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR