CFP last date
22 April 2024
Reseach Article

An Overview of Various Authentication Methods and Protocols

by Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Number 9
Year of Publication: 2015
Authors: Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare
10.5120/ijca2015907389

Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare . An Overview of Various Authentication Methods and Protocols. International Journal of Computer Applications. 131, 9 ( December 2015), 25-27. DOI=10.5120/ijca2015907389

@article{ 10.5120/ijca2015907389,
author = { Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare },
title = { An Overview of Various Authentication Methods and Protocols },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 131 },
number = { 9 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume131/number9/23478-2015907389/ },
doi = { 10.5120/ijca2015907389 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:26:49.538327+05:30
%A Dwiti Pandya
%A Khushboo Ram Narayan
%A Sneha Thakkar
%A Tanvi Madhekar
%A B.S. Thakare
%T An Overview of Various Authentication Methods and Protocols
%J International Journal of Computer Applications
%@ 0975-8887
%V 131
%N 9
%P 25-27
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, various online as well as offline activities have become an integral part of everyone’s life. So, need for the security has increased drastically. For the secure communication, authentication of the connecting party is one of the prime factors. Many techniques and methods are available for authentication. This paper gives an overview of different methods and protocols of authentication, as well as their reliability in today’s world.

References
  1. overview-authentication-methods-protocols-118
  2. JainNandakumar_BiometricAuthenticationSystemSecurityUserPrivacy_IEEEComputer2012
  3. sevenstrongauthenticationmethods.htmlfromhttp://www.networkworld.com/article/2296774/access-control
  4. Online-authentication-methods-Personal-information-cardsandWebSSOfromhttp://www.computerweekly.com/tip
  5. understanding-and-selecting-authentication-methods from http://www.techrepublic.com/article
  6. Kerberos from http://web.mit.edu/
Index Terms

Computer Science
Information Sciences

Keywords

OTP PAP CHAP Protocols