Authentication issues
Existing authentication methods assume that you know who your users are and may already have a database of users
computers in library or school buildings
database of library users or students
Previous slide
Next slide
Back to first slide
View graphic version