Identifying Comparison and Selection Criteria for Authentication Schemes and Methods
- Autores
- Velásquez, Ignacio; Caro, Angélica; Rodríguez, Alfonso
- Año de publicación
- 2017
- Idioma
- inglés
- Tipo de recurso
- documento de conferencia
- Estado
- versión publicada
- Descripción
- Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what comparison and selection criteria exist that help in the decision of these techniques. A systematic literature review is performed in order to obtain the desired knowledge. Moreover, the found comparison and selection criteria are analyzed and organized in order to generate a list of criteria that can be used to help in the decision of authentication techniques in different situations. The results of this research help to cover the gap in literature that could be observed through literature, which is the lack of works that focus on the comparison and selection of authentication techniques.
Sociedad Argentina de Informática e Investigación Operativa - Materia
-
Ciencias Informáticas
authentication scheme
comparison and selection criteria
multi-factor authentication method - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- http://creativecommons.org/licenses/by-sa/4.0/
- Repositorio
- Institución
- Universidad Nacional de La Plata
- OAI Identificador
- oai:sedici.unlp.edu.ar:10915/66152
Ver los metadatos del registro completo
id |
SEDICI_46609ecad0eab467414b814a571d82ee |
---|---|
oai_identifier_str |
oai:sedici.unlp.edu.ar:10915/66152 |
network_acronym_str |
SEDICI |
repository_id_str |
1329 |
network_name_str |
SEDICI (UNLP) |
spelling |
Identifying Comparison and Selection Criteria for Authentication Schemes and MethodsVelásquez, IgnacioCaro, AngélicaRodríguez, AlfonsoCiencias Informáticasauthentication schemecomparison and selection criteriamulti-factor authentication methodMultiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what comparison and selection criteria exist that help in the decision of these techniques. A systematic literature review is performed in order to obtain the desired knowledge. Moreover, the found comparison and selection criteria are analyzed and organized in order to generate a list of criteria that can be used to help in the decision of authentication techniques in different situations. The results of this research help to cover the gap in literature that could be observed through literature, which is the lack of works that focus on the comparison and selection of authentication techniques.Sociedad Argentina de Informática e Investigación Operativa2017-09info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf67-74http://sedici.unlp.edu.ar/handle/10915/66152enginfo:eu-repo/semantics/altIdentifier/url/http://www.clei2017-46jaiio.sadio.org.ar/sites/default/files/Mem/ASSE/asse-10.pdfinfo:eu-repo/semantics/altIdentifier/issn/2451-7593info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-sa/4.0/Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T11:09:50Zoai:sedici.unlp.edu.ar:10915/66152Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 11:09:50.534SEDICI (UNLP) - Universidad Nacional de La Platafalse |
dc.title.none.fl_str_mv |
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods |
title |
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods |
spellingShingle |
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods Velásquez, Ignacio Ciencias Informáticas authentication scheme comparison and selection criteria multi-factor authentication method |
title_short |
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods |
title_full |
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods |
title_fullStr |
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods |
title_full_unstemmed |
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods |
title_sort |
Identifying Comparison and Selection Criteria for Authentication Schemes and Methods |
dc.creator.none.fl_str_mv |
Velásquez, Ignacio Caro, Angélica Rodríguez, Alfonso |
author |
Velásquez, Ignacio |
author_facet |
Velásquez, Ignacio Caro, Angélica Rodríguez, Alfonso |
author_role |
author |
author2 |
Caro, Angélica Rodríguez, Alfonso |
author2_role |
author author |
dc.subject.none.fl_str_mv |
Ciencias Informáticas authentication scheme comparison and selection criteria multi-factor authentication method |
topic |
Ciencias Informáticas authentication scheme comparison and selection criteria multi-factor authentication method |
dc.description.none.fl_txt_mv |
Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what comparison and selection criteria exist that help in the decision of these techniques. A systematic literature review is performed in order to obtain the desired knowledge. Moreover, the found comparison and selection criteria are analyzed and organized in order to generate a list of criteria that can be used to help in the decision of authentication techniques in different situations. The results of this research help to cover the gap in literature that could be observed through literature, which is the lack of works that focus on the comparison and selection of authentication techniques. Sociedad Argentina de Informática e Investigación Operativa |
description |
Multiple techniques exist for performing authentication such as text passwords and smart cards. Multi-factor authentication combines two or more of these techniques in order to enhance security. It is of interest to know what the current research on these authentication techniques is and what comparison and selection criteria exist that help in the decision of these techniques. A systematic literature review is performed in order to obtain the desired knowledge. Moreover, the found comparison and selection criteria are analyzed and organized in order to generate a list of criteria that can be used to help in the decision of authentication techniques in different situations. The results of this research help to cover the gap in literature that could be observed through literature, which is the lack of works that focus on the comparison and selection of authentication techniques. |
publishDate |
2017 |
dc.date.none.fl_str_mv |
2017-09 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/conferenceObject info:eu-repo/semantics/publishedVersion Objeto de conferencia http://purl.org/coar/resource_type/c_5794 info:ar-repo/semantics/documentoDeConferencia |
format |
conferenceObject |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://sedici.unlp.edu.ar/handle/10915/66152 |
url |
http://sedici.unlp.edu.ar/handle/10915/66152 |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/url/http://www.clei2017-46jaiio.sadio.org.ar/sites/default/files/Mem/ASSE/asse-10.pdf info:eu-repo/semantics/altIdentifier/issn/2451-7593 |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) |
dc.format.none.fl_str_mv |
application/pdf 67-74 |
dc.source.none.fl_str_mv |
reponame:SEDICI (UNLP) instname:Universidad Nacional de La Plata instacron:UNLP |
reponame_str |
SEDICI (UNLP) |
collection |
SEDICI (UNLP) |
instname_str |
Universidad Nacional de La Plata |
instacron_str |
UNLP |
institution |
UNLP |
repository.name.fl_str_mv |
SEDICI (UNLP) - Universidad Nacional de La Plata |
repository.mail.fl_str_mv |
alira@sedici.unlp.edu.ar |
_version_ |
1844615966358503424 |
score |
13.070432 |