Identifying Comparison and Selection Criteria for Authentication Schemes and Methods

Autores
Velásquez, Ignacio; Caro, Angélica; Rodríguez, Alfonso
Año de publicación
2017
Idioma
inglés
Tipo de recurso
documento de conferencia
Estado
versión publicada
Descripción
Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what comparison and selection criteria exist that help in the decision of these techniques. A systematic literature review is performed in order to obtain the desired knowledge. Moreover, the found comparison and selection criteria are analyzed and organized in order to generate a list of criteria that can be used to help in the decision of authentication techniques in different situations. The results of this research help to cover the gap in literature that could be observed through literature, which is the lack of works that focus on the comparison and selection of authentication techniques.
Sociedad Argentina de Informática e Investigación Operativa
Materia
Ciencias Informáticas
authentication scheme
comparison and selection criteria
multi-factor authentication method
Nivel de accesibilidad
acceso abierto
Condiciones de uso
http://creativecommons.org/licenses/by-sa/4.0/
Repositorio
SEDICI (UNLP)
Institución
Universidad Nacional de La Plata
OAI Identificador
oai:sedici.unlp.edu.ar:10915/66152

id SEDICI_46609ecad0eab467414b814a571d82ee
oai_identifier_str oai:sedici.unlp.edu.ar:10915/66152
network_acronym_str SEDICI
repository_id_str 1329
network_name_str SEDICI (UNLP)
spelling Identifying Comparison and Selection Criteria for Authentication Schemes and MethodsVelásquez, IgnacioCaro, AngélicaRodríguez, AlfonsoCiencias Informáticasauthentication schemecomparison and selection criteriamulti-factor authentication methodMultiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what comparison and selection criteria exist that help in the decision of these techniques. A systematic literature review is performed in order to obtain the desired knowledge. Moreover, the found comparison and selection criteria are analyzed and organized in order to generate a list of criteria that can be used to help in the decision of authentication techniques in different situations. The results of this research help to cover the gap in literature that could be observed through literature, which is the lack of works that focus on the comparison and selection of authentication techniques.Sociedad Argentina de Informática e Investigación Operativa2017-09info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf67-74http://sedici.unlp.edu.ar/handle/10915/66152enginfo:eu-repo/semantics/altIdentifier/url/http://www.clei2017-46jaiio.sadio.org.ar/sites/default/files/Mem/ASSE/asse-10.pdfinfo:eu-repo/semantics/altIdentifier/issn/2451-7593info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-sa/4.0/Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T11:09:50Zoai:sedici.unlp.edu.ar:10915/66152Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 11:09:50.534SEDICI (UNLP) - Universidad Nacional de La Platafalse
dc.title.none.fl_str_mv Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
title Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
spellingShingle Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
Velásquez, Ignacio
Ciencias Informáticas
authentication scheme
comparison and selection criteria
multi-factor authentication method
title_short Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
title_full Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
title_fullStr Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
title_full_unstemmed Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
title_sort Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
dc.creator.none.fl_str_mv Velásquez, Ignacio
Caro, Angélica
Rodríguez, Alfonso
author Velásquez, Ignacio
author_facet Velásquez, Ignacio
Caro, Angélica
Rodríguez, Alfonso
author_role author
author2 Caro, Angélica
Rodríguez, Alfonso
author2_role author
author
dc.subject.none.fl_str_mv Ciencias Informáticas
authentication scheme
comparison and selection criteria
multi-factor authentication method
topic Ciencias Informáticas
authentication scheme
comparison and selection criteria
multi-factor authentication method
dc.description.none.fl_txt_mv Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what comparison and selection criteria exist that help in the decision of these techniques. A systematic literature review is performed in order to obtain the desired knowledge. Moreover, the found comparison and selection criteria are analyzed and organized in order to generate a list of criteria that can be used to help in the decision of authentication techniques in different situations. The results of this research help to cover the gap in literature that could be observed through literature, which is the lack of works that focus on the comparison and selection of authentication techniques.
Sociedad Argentina de Informática e Investigación Operativa
description Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what comparison and selection criteria exist that help in the decision of these techniques. A systematic literature review is performed in order to obtain the desired knowledge. Moreover, the found comparison and selection criteria are analyzed and organized in order to generate a list of criteria that can be used to help in the decision of authentication techniques in different situations. The results of this research help to cover the gap in literature that could be observed through literature, which is the lack of works that focus on the comparison and selection of authentication techniques.
publishDate 2017
dc.date.none.fl_str_mv 2017-09
dc.type.none.fl_str_mv info:eu-repo/semantics/conferenceObject
info:eu-repo/semantics/publishedVersion
Objeto de conferencia
http://purl.org/coar/resource_type/c_5794
info:ar-repo/semantics/documentoDeConferencia
format conferenceObject
status_str publishedVersion
dc.identifier.none.fl_str_mv http://sedici.unlp.edu.ar/handle/10915/66152
url http://sedici.unlp.edu.ar/handle/10915/66152
dc.language.none.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv info:eu-repo/semantics/altIdentifier/url/http://www.clei2017-46jaiio.sadio.org.ar/sites/default/files/Mem/ASSE/asse-10.pdf
info:eu-repo/semantics/altIdentifier/issn/2451-7593
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
http://creativecommons.org/licenses/by-sa/4.0/
Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-sa/4.0/
Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)
dc.format.none.fl_str_mv application/pdf
67-74
dc.source.none.fl_str_mv reponame:SEDICI (UNLP)
instname:Universidad Nacional de La Plata
instacron:UNLP
reponame_str SEDICI (UNLP)
collection SEDICI (UNLP)
instname_str Universidad Nacional de La Plata
instacron_str UNLP
institution UNLP
repository.name.fl_str_mv SEDICI (UNLP) - Universidad Nacional de La Plata
repository.mail.fl_str_mv alira@sedici.unlp.edu.ar
_version_ 1844615966358503424
score 13.070432