Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what compar...
Autores principales: | , , |
---|---|
Formato: | Objeto de conferencia |
Lenguaje: | Inglés |
Publicado: |
2017
|
Materias: | |
Acceso en línea: | http://sedici.unlp.edu.ar/handle/10915/66152 http://www.clei2017-46jaiio.sadio.org.ar/sites/default/files/Mem/ASSE/asse-10.pdf |
Aporte de: |
id |
I19-R120-10915-66152 |
---|---|
record_format |
dspace |
institution |
Universidad Nacional de La Plata |
institution_str |
I-19 |
repository_str |
R-120 |
collection |
SEDICI (UNLP) |
language |
Inglés |
topic |
Ciencias Informáticas authentication scheme comparison and selection criteria multi-factor authentication method |
spellingShingle |
Ciencias Informáticas authentication scheme comparison and selection criteria multi-factor authentication method Velásquez, Ignacio Caro, Angélica Rodríguez, Alfonso Identifying Comparison and Selection Criteria for Authentication Schemes and Methods |
topic_facet |
Ciencias Informáticas authentication scheme comparison and selection criteria multi-factor authentication method |
description |
Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what comparison and selection criteria exist that help in the decision of these techniques. A systematic literature review is performed in order to obtain the desired knowledge. Moreover, the found comparison and selection criteria are analyzed and organized in order to generate a list of criteria that can be used to help in the decision of authentication techniques in different situations. The results of this research help to cover the gap in literature that could be observed through literature, which is the lack of works that focus on the comparison and selection of authentication techniques. |
format |
Objeto de conferencia Objeto de conferencia |
author |
Velásquez, Ignacio Caro, Angélica Rodríguez, Alfonso |
author_facet |
Velásquez, Ignacio Caro, Angélica Rodríguez, Alfonso |
author_sort |
Velásquez, Ignacio |
title |
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods |
title_short |
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods |
title_full |
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods |
title_fullStr |
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods |
title_full_unstemmed |
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods |
title_sort |
identifying comparison and selection criteria for authentication schemes and methods |
publishDate |
2017 |
url |
http://sedici.unlp.edu.ar/handle/10915/66152 http://www.clei2017-46jaiio.sadio.org.ar/sites/default/files/Mem/ASSE/asse-10.pdf |
work_keys_str_mv |
AT velasquezignacio identifyingcomparisonandselectioncriteriaforauthenticationschemesandmethods AT caroangelica identifyingcomparisonandselectioncriteriaforauthenticationschemesandmethods AT rodriguezalfonso identifyingcomparisonandselectioncriteriaforauthenticationschemesandmethods |
bdutipo_str |
Repositorios |
_version_ |
1764820481046740992 |