{"title":"电子交易系统中常用的几种认证方法比较","authors":"Weijian Huang, Wei Du, L. Guo, Liang Huang","doi":"10.1109/ICIE.2010.155","DOIUrl":null,"url":null,"abstract":"When the network is increasingly becoming a part of people's lives at the same time, network and information security has also become one of the issues of most concern,. This article is based on a brief introduction in terms of information security, several commonly used way of authentication technologies and their advantages and disadvantages. Different levels of security authentication methods are very the different, security is the most important factor authentication, but not all. In the following several authentication methods, we are also according to compatibility, convenience and the use of cost considerations.","PeriodicalId":353239,"journal":{"name":"2010 WASE International Conference on Information Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Electronic Trading Systems in Several Authentication Methods Commonly Used Comparison\",\"authors\":\"Weijian Huang, Wei Du, L. Guo, Liang Huang\",\"doi\":\"10.1109/ICIE.2010.155\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When the network is increasingly becoming a part of people's lives at the same time, network and information security has also become one of the issues of most concern,. This article is based on a brief introduction in terms of information security, several commonly used way of authentication technologies and their advantages and disadvantages. Different levels of security authentication methods are very the different, security is the most important factor authentication, but not all. In the following several authentication methods, we are also according to compatibility, convenience and the use of cost considerations.\",\"PeriodicalId\":353239,\"journal\":{\"name\":\"2010 WASE International Conference on Information Engineering\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-08-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 WASE International Conference on Information Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIE.2010.155\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 WASE International Conference on Information Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIE.2010.155","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Electronic Trading Systems in Several Authentication Methods Commonly Used Comparison
When the network is increasingly becoming a part of people's lives at the same time, network and information security has also become one of the issues of most concern,. This article is based on a brief introduction in terms of information security, several commonly used way of authentication technologies and their advantages and disadvantages. Different levels of security authentication methods are very the different, security is the most important factor authentication, but not all. In the following several authentication methods, we are also according to compatibility, convenience and the use of cost considerations.