Authentication Methods and Techniques for Information Security Purposes in Corporate Information Systems
Major authentication technologies used in corporate information systems are reviewed. Advantages, disadvantages and applications of various authentication methods are analyzed.
| Published in: | Безопасность информационных технологий |
|---|---|
| Main Author: | |
| Format: | Article |
| Language: | English |
| Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2010-09-01
|
| Subjects: | |
| Online Access: | https://bit.mephi.ru/index.php/bit/article/view/704 |
