Proximity Authentication

The author discusses protecting data by denying direct physical access onto a user's computer; that is, protect sensitive data terminals from being used by unauthorized users. The emphasis is on how to identify users - to make sure that they are who they claim to be, to a certain level of certainty...
By
Ali Merayyan
July 16, 2001

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg