
Using the ideal point method to search the best authentication method in corporate information systems
Author(s) -
O.V. Loginovskiy,
M.E. Koval,
A.A. Shinkarev
Publication year - 2022
Publication title -
vestnik ûžno-uralʹskogo gosudarstvennogo universiteta. seriâ, kompʹûternye tehnologii, upravlenie, èlektronika
Language(s) - English
Resource type - Journals
eISSN - 2409-6571
pISSN - 1991-976X
DOI - 10.14529/ctcr220301
Subject(s) - computer science , password , authentication (law) , computer security , login , challenge–response authentication , multi factor authentication , point (geometry) , authentication protocol , data mining , geometry , mathematics