Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publication Citation: Guideline for the Use of Advanced Authentication Technology Alternatives

NIST Authors in Bold

Author(s): James Foti;
Title: Guideline for the Use of Advanced Authentication Technology Alternatives
Published: September 28, 1994
Abstract: [Withdrawn October 19, 2015] This Guideline describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations to Federal agencies and departments for the acquisition and use of technology which supports these methods. Although the traditional approach to authentication relies primarily on passwords, it is clear that password-only authentication often fails to provide an adequate level of protection. Stronger authentication techniques become increasingly more important as information processing evolves toward an open systems environment. Modern technology has produced authentication tokens and biometric devices which are reliable, practical, and cost-effective. Passwords, tokens, and biometrics can be used in various combinations to provide far greater assurance in the authentication process than can be attained with passwords alone.
Citation: Federal Inf. Process. Stds. (NIST FIPS) - 190
Pages: 61 pp.
Keywords: computer security, cryptographic modules, cryptography, Federal Information Processing Standards Publication, telecommunication security
Research Areas: Computer Security, Federal Information Processing Standards
PDF version: PDF Document Click here to retrieve PDF version of paper (417KB)