Authentication Methods and Techniques for Information Security Purposes in Corporate Information Systems
Major authentication technologies used in corporate information systems are reviewed. Advantages, disadvantages and applications of various authentication methods are analyzed.
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2010-09-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/704 |