Concepedia

Publication | Closed Access

Remote Client Authentication

21

Citations

10

References

2008

Year

Abstract

The effectiveness of remote client-authentication schemes varies significantly in relation to today's security challenges, which include phishing, man-in-the-middle attacks, and malicious software. A survey of remote authentication methods shows how each measures up and includes recommendations for solution developers and consumers.

References

YearCitations

Page 1