Evaluating current authentication methods: Prediction of a more suitable authentication approach for public interaction
The trend in information technology is towards achieving ubiquitous service rendering where barriers (geographical, time) in getting information related services will be eliminated. A good example of this is the ATM machines used by banks for public banking services, the likes in other sectors are...
Saved in:
Main Authors: | R. G., Jimoh, Shiratuddin, Norshuhada |
---|---|
格式: | Conference or Workshop Item |
语言: | English |
出版: |
2009
|
主题: | |
在线阅读: | http://repo.uum.edu.my/13475/1/PID60.pdf http://repo.uum.edu.my/13475/ http://www.icoci.cms.net.my |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
相似书籍
-
The acceptability of iris-based authentication for public domain: An instrumental design
由: R. G., Jimoh, et al.
出版: (2010) -
Prediction of Pakistani Honey Authenticity through Machine Learning
由: Noureen Fatima, et al.
出版: (2022) -
A lightweight and robust authentication scheme for the healthcare system using public cloud server
由: Irshad, Ahmed Abbasi, et al.
出版: (2024) -
Authentication and authorization in cloud computing using kerberos
由: Hidar, Ahmad M. Saeed
出版: (2014) -
Keystroke dynamic authentication in mobile cloud computing
由: Babaeizadeh, Mahnoush
出版: (2014)