| Article ID | Journal | Published Year | Pages | File Type |
|---|---|---|---|---|
| 6948146 | Information and Software Technology | 2018 | 19 Pages |
Abstract
The review shows that a vast research has been done for authentication techniques, although its use in some contexts has not been researched as much. The lack of works regarding the comparison and selection of authentication techniques is observed.
Related Topics
Physical Sciences and Engineering
Computer Science
Human-Computer Interaction
Authors
Ignacio Velásquez, Angélica Caro, Alfonso RodrÃguez,
