Authentication Methods and Techniques for Information Security Purposes in Corporate Information Systems

Major authentication technologies used in corporate information systems are reviewed. Advantages, disadvantages and applications of various authentication methods are analyzed.

Bibliographic Details
Main Author: O. V. Kulikova
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2010-09-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/704