A method for ranking authentication products

نویسندگان

  • Kirsi Helkala
  • Einar Snekkenes
چکیده

There is a steady increase in both authentication methods and products implementing these methods. Product selection has impact on strategic factors such as system security, cost and usability. This paper presents a new method for ranking authentication products. The method can contribute towards an improved decision process. Using our method, issues such as technical performance, application/system specific requirements, cost and usability are addressed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Solution for the Allocation of Customers Authentication Methods (The Case of Multimedia Contact Center in Agriculture Bank of Iran)

In order to provide different services for the customers, banks embark on a multimedia contact center. Considering that, in this center, where several services such as transferring money, getting statement information and asking for check books are provided, the authentication is of high importance. How to allocate the appropriate authentication method for each customer is one of the challe...

متن کامل

Ranking SMEs in Qazvin Province with evaluating competitive advantage by TOPSIS method

Small and medium-sized enterprises (SMEs) are a foundation for Economic and regional development that provide the background of the equipping resources and thereby increase national income and create job opportunities in the regional and national levels. Given the critical role of these firms, industrial planners should consider the competitive advantage of different industrial activities. In t...

متن کامل

Authentication of Red Meat Quantities Reported on Labels of the Industrial Kebab Loghmeh Using Analysis of Fourier Transform Infrared Data and Chemometric Methods

Background and Objectives: Kebab loghmeh is one of the most popular meat products in Iran. Quantitative assessment of the red meats is critical as the most important factor in authentication of this meat product. Other methods of adulteration tracing do not include enough efficiency to quantitatively assess quantities of the red meats in final products. Therefore, the objective of the current s...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Ranking Iranian Accredited Laboratories with Proficiency Tests Using PR0METHEE Method

The rapid pace of changing technology is leading to high rate of import and export between different countries. In outsourcing governmental organizations duties to private sectors, it is a need to control sectors and they should be under assessment policy. This research has been developed to show how the accredited laboratories of Iranian standard (ISIRI) can be assessed for their technical ser...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008