Publication | Closed Access
Remote Client Authentication
21
Citations
10
References
2008
Year
Authentication AuthorizationEngineeringUsable SecurityInformation SecurityRemote Authentication MethodsIdentity-based SecurityAuthenticationMalicious SoftwareSecurity ChallengesAuthentication Access ControlAuthentication ProtocolRemote Client AuthenticationData SecurityCryptography
The effectiveness of remote client-authentication schemes varies significantly in relation to today's security challenges, which include phishing, man-in-the-middle attacks, and malicious software. A survey of remote authentication methods shows how each measures up and includes recommendations for solution developers and consumers.
| Year | Citations | |
|---|---|---|
Page 1
Page 1