Identification and authentication as the basis for information protection in computer systems
Basic methods for user authentication and their features when performing access to computer systems are considered. They include password protection, authentication hardware, and biometric authentication, as well as determining the identity of access subjects by using their coordinates. Modern avenu...
Saved in:
Published in | Scientific and technical information processing Vol. 39; no. 3; pp. 133 - 138 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
Heidelberg
Allerton Press, Inc
01.07.2012
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Basic methods for user authentication and their features when performing access to computer systems are considered. They include password protection, authentication hardware, and biometric authentication, as well as determining the identity of access subjects by using their coordinates. Modern avenues of research into information protection are discussed. |
---|---|
Bibliography: | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
ISSN: | 0147-6882 1934-8118 |
DOI: | 10.3103/S0147688212030021 |