[PDF][PDF] Authentication systems: Principles and threats

SN Abdulkader, A Atia, MSM Mostafa - Computer and Information …, 2015 - academia.edu
Identity manipulation is considered a serious security issue that has been enlarged with the
spread of automated systems that could be accessed either locally or remotely. Availability,
integrity, and confidentiality represent the basic requirements that should be granted for
successful authentication systems. Personality verification has taken multiple forms
depending on different possession types. They are divided into knowledge based, token
based, and biometric based authentication. The permanent ownership to the human being …

[引用][C] Authentication systems: Principles and threats

A Atia, SN Abdulkader, MS Mostafa - Computer and Information Science, 2015
以上显示的是最相近的搜索结果。 查看全部搜索结果