Безопасность информационных технологий (Sep 2010)
Authentication Methods and Techniques for Information Security Purposes in Corporate Information Systems
Abstract
Major authentication technologies used in corporate information systems are reviewed. Advantages, disadvantages and applications of various authentication methods are analyzed.