Call for Paper - December 2019 Edition
IJCA solicits original research papers for the December 2019 Edition. Last date of manuscript submission is November 20, 2019. Read More

An Overview of Various Authentication Methods and Protocols

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2015
Authors:
Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare
10.5120/ijca2015907389

Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar and B S Thakare. Article: An Overview of Various Authentication Methods and Protocols. International Journal of Computer Applications 131(9):25-27, December 2015. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Dwiti Pandya and Khushboo Ram Narayan and Sneha Thakkar and Tanvi Madhekar and B.S. Thakare},
	title = {Article: An Overview of Various Authentication Methods and Protocols},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {131},
	number = {9},
	pages = {25-27},
	month = {December},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Nowadays, various online as well as offline activities have become an integral part of everyone’s life. So, need for the security has increased drastically. For the secure communication, authentication of the connecting party is one of the prime factors. Many techniques and methods are available for authentication. This paper gives an overview of different methods and protocols of authentication, as well as their reliability in today’s world.

References

  1. overview-authentication-methods-protocols-118
  2. JainNandakumar_BiometricAuthenticationSystemSecurityUserPrivacy_IEEEComputer2012
  3. sevenstrongauthenticationmethods.htmlfromhttp://www.networkworld.com/article/2296774/access-control
  4. Online-authentication-methods-Personal-information-cardsandWebSSOfromhttp://www.computerweekly.com/tip
  5. understanding-and-selecting-authentication-methods from http://www.techrepublic.com/article
  6. Kerberos from http://web.mit.edu/

Keywords

OTP, PAP, CHAP, Protocols