Authentication Methods and Techniques for Information Security Purposes in Corporate Information Systems

O. V. Kulikova
2010 Bezopasnostʹ Informacionnyh Tehnologij  
Major authentication technologies used in corporate information systems are reviewed. Advantages, disadvantages and applications of various authentication methods are analyzed.
doaj:956a8a7ad5d44f558d2d66d7bdea861a fatcat:kjqgxy6lfjg7xobaybfqyyk7pq