Abstract

The article discusses in detail both the advantages and disadvantages of the most commonly used identification and authentication methods. Comparative characteristics of different types of personal identifiers are carried out. Attention is drawn to the need for an integrated approach to solving problems of identification and authentication.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call