Research Article

An Overview of Various Authentication Methods and Protocols

by  Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Issue 9
Published: December 2015
Authors: Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare
10.5120/ijca2015907389
PDF

Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare . An Overview of Various Authentication Methods and Protocols. International Journal of Computer Applications. 131, 9 (December 2015), 25-27. DOI=10.5120/ijca2015907389

                        @article{ 10.5120/ijca2015907389,
                        author  = { Dwiti Pandya,Khushboo Ram Narayan,Sneha Thakkar,Tanvi Madhekar,B.S. Thakare },
                        title   = { An Overview of Various Authentication Methods and Protocols },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 131 },
                        number  = { 9 },
                        pages   = { 25-27 },
                        doi     = { 10.5120/ijca2015907389 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A Dwiti Pandya
                        %A Khushboo Ram Narayan
                        %A Sneha Thakkar
                        %A Tanvi Madhekar
                        %A B.S. Thakare
                        %T An Overview of Various Authentication Methods and Protocols%T 
                        %J International Journal of Computer Applications
                        %V 131
                        %N 9
                        %P 25-27
                        %R 10.5120/ijca2015907389
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, various online as well as offline activities have become an integral part of everyone’s life. So, need for the security has increased drastically. For the secure communication, authentication of the connecting party is one of the prime factors. Many techniques and methods are available for authentication. This paper gives an overview of different methods and protocols of authentication, as well as their reliability in today’s world.

References
  • overview-authentication-methods-protocols-118
  • JainNandakumar_BiometricAuthenticationSystemSecurityUserPrivacy_IEEEComputer2012
  • sevenstrongauthenticationmethods.htmlfromhttp://www.networkworld.com/article/2296774/access-control
  • Online-authentication-methods-Personal-information-cardsandWebSSOfromhttp://www.computerweekly.com/tip
  • understanding-and-selecting-authentication-methods from http://www.techrepublic.com/article
  • Kerberos from http://web.mit.edu/
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

OTP PAP CHAP Protocols

Powered by PhDFocusTM