Identification and authentication as the basis for information protection in computer systems
Basic methods for user authentication and their features when performing access to computer systems are considered. They include password protection, authentication hardware, and biometric authentication, as well as determining the identity of access subjects by using their coordinates. Modern avenu...
Saved in:
Published in | Scientific and technical information processing Vol. 39; no. 3; pp. 133 - 138 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
Heidelberg
Allerton Press, Inc
01.07.2012
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!