International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 131 - Issue 9 |
Published: December 2015 |
Authors: Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare |
![]() |
Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare . An Overview of Various Authentication Methods and Protocols. International Journal of Computer Applications. 131, 9 (December 2015), 25-27. DOI=10.5120/ijca2015907389
@article{ 10.5120/ijca2015907389, author = { Dwiti Pandya,Khushboo Ram Narayan,Sneha Thakkar,Tanvi Madhekar,B.S. Thakare }, title = { An Overview of Various Authentication Methods and Protocols }, journal = { International Journal of Computer Applications }, year = { 2015 }, volume = { 131 }, number = { 9 }, pages = { 25-27 }, doi = { 10.5120/ijca2015907389 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2015 %A Dwiti Pandya %A Khushboo Ram Narayan %A Sneha Thakkar %A Tanvi Madhekar %A B.S. Thakare %T An Overview of Various Authentication Methods and Protocols%T %J International Journal of Computer Applications %V 131 %N 9 %P 25-27 %R 10.5120/ijca2015907389 %I Foundation of Computer Science (FCS), NY, USA
Nowadays, various online as well as offline activities have become an integral part of everyone’s life. So, need for the security has increased drastically. For the secure communication, authentication of the connecting party is one of the prime factors. Many techniques and methods are available for authentication. This paper gives an overview of different methods and protocols of authentication, as well as their reliability in today’s world.