20200829044506incorporating Quotes Worksheet

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Incorporating Quotes Worksheet

Original Information #1:

Web services such as on-line shopping and Internet banking have become common in

today’s technological world, and this has given rise to serious demand for remote authentication

processes that ensure transactions between users and servers are secure.

Revised Information #1:

________ In the journal Security enhanced multi-factor biometric authentication scheme using

bio-hash function Choi et al. argues that technology has resulted in the increased demand for the

implementation of remote authentication practices that may assist in the overall improvement of

security of the principal transactions.

Original Information #2:

____________ So, the bio-hash function can resolve the recognition error of general hash

function and can authenticate a legal user even if the user’s biometric information changes a

little.

Revised Information #2:

_________ Cho states that a bio-hash function is an essential tool that helps in ensuring that the

recognition error involved in the general hash function is resolved. In an instance where the

biometric data of the user of the system is likely to have a slight change, the bio-hash function

can assist in authenticating a legal user of the system.

Original Information #3:


__________ A wide variety of systems require reliable personal authentication schemes to either

confirm or determine the identity of individuals requesting their services.

Revised Information #3:

____________ Personal authentication scheme is the main requirement by various systems that

may assist in the confirmation of the people who may access a specific system. In the article

Biometric security system: a rigorous review of unimodal and multimodal biometrics techniques

Gawande and Golhar argues that personal authentication schemes are necessary for facilitating a

positive change in the performance of most of the systems that may directly involve different

users.

Original Information #4:

________________ Slow wrong password detection refers to instances in which the user cannot

know of a mistake immediately when inputting the wrong password, and the user can know

when server Si notifies there is a wrong user password.

Revised Information #4:

_______________ The chances of using a wrong password are relatively high, according to Cho,

which requires the integration of reliable tool. According to the authors, there is an instance

where one may not have an idea of whether the password that they have put in the system is

wrong. To learn whether the password is the right one, the notification given by the server about

the password error may help the user to learn the mistake that could have made it hard for them

to access the system.


References

Choi, Y., Lee, Y., Moon, J., & Won, D. (2017). Security enhanced multi-factor biometric

authentication scheme using the bio-hash function. PloS one, 12(5), e0176250.

Gawande, U., & Golhar, Y. (2018). Biometric security system: a rigorous review of unimodal

and multimodal biometrics techniques. International Journal of Biometrics, 10(2), 142-

175.

You might also like