Безопасность информационных технологий (Sep 2010)

Authentication Methods and Techniques for Information Security Purposes in Corporate Information Systems

  • O. V. Kulikova

Journal volume & issue
Vol. 17, no. 3
pp. 85 – 91

Abstract

Read online

Major authentication technologies used in corporate information systems are reviewed. Advantages, disadvantages and applications of various authentication methods are analyzed.

Keywords