Authentication Methods and Techniques for Information Security Purposes in Corporate Information Systems

Major authentication technologies used in corporate information systems are reviewed. Advantages, disadvantages and applications of various authentication methods are analyzed.

Bibliographic Details
Published in:Безопасность информационных технологий
Main Author: O. V. Kulikova
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2010-09-01
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/704