chapter  45
8 Pages

Usability evaluation of personal security codes based on portraits of human faces

Token-based systems that rely on PINs or passwords to activate the token suffer from the same problems. Passwords are still by far the most commonly used authentication tool, but there are some threats to password security.