Authentication systems: a literature review and classification
One of the most important parts of any system is authentication. Appreciated as the first and the last line of defense in the great majority of cases, authentication systems can usually prevent the kleptomaniac from unauthorized accessing to users’ data. However, the traditional text-based password...
Saved in:
Main Authors: | Barkadehi, Mohammadreza Hazhirpasand, Nilashi, Mehrbaksh, Ibrahim, Othman, Fardi, Ali Zakeri, Samad, Sarminah |
---|---|
Format: | Article |
Published: |
Elsevier Ltd.
2018
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/84209/ https://doi.org/10.1016/j.tele.2018.03.018 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Information technology adoption: a review of the literature and classification
by: Salahshour Rad, M., et al.
Published: (2017) -
Disease diagnosis using machine learning techniques: A review and classification
by: Nilashi, Mehrbakhsh, et al.
Published: (2020) -
A systematic review on hadith authentication and classification methods
by: Binbeshr, Farid, et al.
Published: (2021) -
Analysis of travellers' online reviews in social networking sites using fuzzy logic approach
by: Nilashi, Mehrbakhsh, et al.
Published: (2019) -
Intelligent recommender systems in the covid-19 outbreak: the case of wearable healthcare devices
by: Nilashi, Mehrbakhsh, et al.
Published: (2020)