A method for ranking authentication products

There is a steady increase in both authentication methods and products implementing these methods. Product selection has impact on strategic factors such as system security, cost and usability. This paper presents a new method for ranking authentication products. The method can contribute towards an improved decision process. Using our method, issues such as technical performance, application/system specific requirements, cost and usability are addressed.