Article ID Journal Published Year Pages File Type
6948146 Information and Software Technology 2018 19 Pages PDF
Abstract
The review shows that a vast research has been done for authentication techniques, although its use in some contexts has not been researched as much. The lack of works regarding the comparison and selection of authentication techniques is observed.
Related Topics
Physical Sciences and Engineering Computer Science Human-Computer Interaction
Authors
, , ,