Authentication methods review: how to enhance identity trust in authentication
A great variety of methods which perform authentication have been introduced in information systems over the years, spanning from using simple text passwords to applying complex biometric authentication techniques. All those methods try to corroborate a digital identity that requests access to or se...
Saved in:
| Main Authors: | , , , |
|---|---|
| Other Authors: | |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/11610/18814 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|