Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
458497 | Infosecurity | 2011 | 4 Pages |
Abstract
With the RSA security breach still fresh in the minds of information security practitioners across the world, you'd be forgiven for assuming that the heyday for token-based ID is long gone. Stephen Pritchard investigates the advantages and disadvantages of token-based ID and finds out why, for now at least, it's here to stay
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Stephen Pritchard,