Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Security

Submission + - Authentication Maturity Level

zakiakhmad writes: "Hi! I am trying to do research on several authentication methods, such as: Token, PKI(Public Key Infrastructure), Biometrics, RFID (Radio Frequency Identification) etc. I need to know the correlation between the authentication method with the maturity level for each authentication method. To be precise, I need to know the state of each authentication method: How do the market response? Any data will be very helpful. Thank you for your attention. Zaki Akhmad"

A successful [software] tool is one that was used to do something undreamed of by its author. -- S. C. Johnson

Working...