Verifying the authentication of an information system user

Niv Ahituv*, Yeheskel Lapid, Seev Neumann

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

11 Scopus citations


This paper evaluates a number of methods for authentication and passwording. It first discusses the role of authentication as a component in an overall approach to information system security. It then classifies the various approaches to authentication into two categories: natural properties and artificial measures. Among the artificial measures, password is most common. The paper provides a quantitative measure for password robustness and 'lasting' power. It discusses encryption possibilities and provides a comparative evaluation of various password methods. The paper concludes by providing some guidelines for evaluating authentication methods.

Original languageEnglish
Pages (from-to)152-157
Number of pages6
JournalComputers and Security
Issue number2
StatePublished - Apr 1987


  • Authentication
  • Data security
  • Information system security
  • Password
  • Password encryption


Dive into the research topics of 'Verifying the authentication of an information system user'. Together they form a unique fingerprint.

Cite this