Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what compar...
Guardado en:
| Autores principales: | Velásquez, Ignacio, Caro, Angélica, Rodríguez, Alfonso |
|---|---|
| Formato: | Objeto de conferencia |
| Lenguaje: | Inglés |
| Publicado: |
2017
|
| Materias: | |
| Acceso en línea: | http://sedici.unlp.edu.ar/handle/10915/66152 http://www.clei2017-46jaiio.sadio.org.ar/sites/default/files/Mem/ASSE/asse-10.pdf |
| Aporte de: |
Ejemplares similares
-
How authentic is the vocabulary dealt with in class?
por: Sapag, Nora Lía, et al.
Publicado: (2022) -
Two-Way Continual Authentication Model
por: Lugani, Carlos Fabián
Publicado: (2017) -
Designing authentic activities for a university course : an eclectic approach
por: Dalla Costa, Natalia, et al.
Publicado: (2022) -
Víctimas y victimarios:: Clitemnestra y la figura del authéntes en Ifigenia en Áulide
por: Rodríguez Cidre, Elsa
Publicado: (2021) -
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
por: Saraireh, Ja'afer M. al, et al.
Publicado: (2011)