Owing to the growing significance of data protection and informatics in general, the importance of information system security counts among the most actual topics at this time. The main goal of this work is to give a comprehensive overview of the issue of users' authentication, including current trends on this field. There are also described the principles and working methods of classic and modern authentication methods, and listed their pros and cons. The main benefit lies in the comparison of these methods as well as in the evaluation of their deployment. As a result of this are suggestions, which can managers take into account when deciding about the method of authentication, and a description of weak points that need an attention. One p...
OA-julkaisu. Lisää artikkeli, kun julkaistu.In order to overcome the difficulty of password manageme...
OA-julkaisu. Lisää artikkeli, kun julkaistu.In order to overcome the difficulty of password manageme...
With the latest developments in technology, extra and extra human beings depend on their private gad...
The file attached to this record is the author's final peer reviewed version. Open access article.Th...
Security and usability assessment of several authentication technologies In todays modern society, u...
The Objectives were it to inform the work of outsider Even Slightly hip readers of information techn...
This thesis is focused on authentication methods, for regular private users and company solutions. B...
ABSTRACT: Various Password authentications methods are available now a days Now a day’s various comp...
The problem of minimizing the possibility of obtaining unauthorized access to information is investi...
This work is a comprehensive overview of trends of authentication mechanisms for access control. It ...
Biometrics is increasingly applied in IT (biometric methods today generally use computer technology)...
With the advances in Information Technology (IT) there has been an increase in threats to the commun...
New information technologies alongside their benefits also bring new dangers with themselves. It is ...
Today security concerns are on the rise in all area such as banks, government organizations, busines...
New information technologies alongside their benefits also bring new dangers with themselves. It is ...
OA-julkaisu. Lisää artikkeli, kun julkaistu.In order to overcome the difficulty of password manageme...
OA-julkaisu. Lisää artikkeli, kun julkaistu.In order to overcome the difficulty of password manageme...
With the latest developments in technology, extra and extra human beings depend on their private gad...
The file attached to this record is the author's final peer reviewed version. Open access article.Th...
Security and usability assessment of several authentication technologies In todays modern society, u...
The Objectives were it to inform the work of outsider Even Slightly hip readers of information techn...
This thesis is focused on authentication methods, for regular private users and company solutions. B...
ABSTRACT: Various Password authentications methods are available now a days Now a day’s various comp...
The problem of minimizing the possibility of obtaining unauthorized access to information is investi...
This work is a comprehensive overview of trends of authentication mechanisms for access control. It ...
Biometrics is increasingly applied in IT (biometric methods today generally use computer technology)...
With the advances in Information Technology (IT) there has been an increase in threats to the commun...
New information technologies alongside their benefits also bring new dangers with themselves. It is ...
Today security concerns are on the rise in all area such as banks, government organizations, busines...
New information technologies alongside their benefits also bring new dangers with themselves. It is ...
OA-julkaisu. Lisää artikkeli, kun julkaistu.In order to overcome the difficulty of password manageme...
OA-julkaisu. Lisää artikkeli, kun julkaistu.In order to overcome the difficulty of password manageme...
With the latest developments in technology, extra and extra human beings depend on their private gad...