Identifying Comparison and Selection Criteria for Authentication Schemes and Methods

Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what compar...

Descripción completa

Detalles Bibliográficos
Autores principales: Velásquez, Ignacio, Caro, Angélica, Rodríguez, Alfonso
Formato: Objeto de conferencia
Lenguaje:Inglés
Publicado: 2017
Materias:
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/66152
http://www.clei2017-46jaiio.sadio.org.ar/sites/default/files/Mem/ASSE/asse-10.pdf
Aporte de:
id I19-R120-10915-66152
record_format dspace
institution Universidad Nacional de La Plata
institution_str I-19
repository_str R-120
collection SEDICI (UNLP)
language Inglés
topic Ciencias Informáticas
authentication scheme
comparison and selection criteria
multi-factor authentication method
spellingShingle Ciencias Informáticas
authentication scheme
comparison and selection criteria
multi-factor authentication method
Velásquez, Ignacio
Caro, Angélica
Rodríguez, Alfonso
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
topic_facet Ciencias Informáticas
authentication scheme
comparison and selection criteria
multi-factor authentication method
description Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what comparison and selection criteria exist that help in the decision of these techniques. A systematic literature review is performed in order to obtain the desired knowledge. Moreover, the found comparison and selection criteria are analyzed and organized in order to generate a list of criteria that can be used to help in the decision of authentication techniques in different situations. The results of this research help to cover the gap in literature that could be observed through literature, which is the lack of works that focus on the comparison and selection of authentication techniques.
format Objeto de conferencia
Objeto de conferencia
author Velásquez, Ignacio
Caro, Angélica
Rodríguez, Alfonso
author_facet Velásquez, Ignacio
Caro, Angélica
Rodríguez, Alfonso
author_sort Velásquez, Ignacio
title Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
title_short Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
title_full Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
title_fullStr Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
title_full_unstemmed Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
title_sort identifying comparison and selection criteria for authentication schemes and methods
publishDate 2017
url http://sedici.unlp.edu.ar/handle/10915/66152
http://www.clei2017-46jaiio.sadio.org.ar/sites/default/files/Mem/ASSE/asse-10.pdf
work_keys_str_mv AT velasquezignacio identifyingcomparisonandselectioncriteriaforauthenticationschemesandmethods
AT caroangelica identifyingcomparisonandselectioncriteriaforauthenticationschemesandmethods
AT rodriguezalfonso identifyingcomparisonandselectioncriteriaforauthenticationschemesandmethods
bdutipo_str Repositorios
_version_ 1764820481046740992