Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Title:||Guideline for the Use of Advanced Authentication Technology Alternatives|
|Published:||September 28, 1994|
|Abstract:||[Withdrawn October 19, 2015] This Guideline describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations to Federal agencies and departments for the acquisition and use of technology which supports these methods. Although the traditional approach to authentication relies primarily on passwords, it is clear that password-only authentication often fails to provide an adequate level of protection. Stronger authentication techniques become increasingly more important as information processing evolves toward an open systems environment. Modern technology has produced authentication tokens and biometric devices which are reliable, practical, and cost-effective. Passwords, tokens, and biometrics can be used in various combinations to provide far greater assurance in the authentication process than can be attained with passwords alone.|
|Citation:||Federal Inf. Process. Stds. (NIST FIPS) - 190|
|Keywords:||computer security, cryptographic modules, cryptography, Federal Information Processing Standards Publication, telecommunication security|
|Research Areas:||Computer Security, Federal Information Processing Standards|
|PDF version:||Click here to retrieve PDF version of paper (417KB)|