Presented By: M.Bhargavi 08Q61A0558
Presented By: M.Bhargavi 08Q61A0558
Presented By: M.Bhargavi 08Q61A0558
M.Bhargavi
08Q61A0558
Introduction
Overview of the Authentication Methods
The survey
Recognition Based Techniques
Recall Based Techniques
Discusssion
Security
Usability
Conclusion
How about text-based passwords ?
Difficulty of remembering passwords
easy to remember -> easy to guess
hard to guess -> hard to remember
Signature Scheme
Using images with random tracks
of geometric graphical shapes
Guessing
Social engineering
Pictures are easier to remember than text
strings