Identification and authentication as the basis for information protection in computer systems

Basic methods for user authentication and their features when performing access to computer systems are considered. They include password protection, authentication hardware, and biometric authentication, as well as determining the identity of access subjects by using their coordinates. Modern avenu...

Full description

Saved in:
Bibliographic Details
Published inScientific and technical information processing Vol. 39; no. 3; pp. 133 - 138
Main Author Arutyunov, V. V.
Format Journal Article
LanguageEnglish
Published Heidelberg Allerton Press, Inc 01.07.2012
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Basic methods for user authentication and their features when performing access to computer systems are considered. They include password protection, authentication hardware, and biometric authentication, as well as determining the identity of access subjects by using their coordinates. Modern avenues of research into information protection are discussed.
Bibliography:SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
ISSN:0147-6882
1934-8118
DOI:10.3103/S0147688212030021