Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Network Security Analysis based on Authentication Techniques

Print
PDF
IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research
© 2019 by IJCA Journal
ICAIM 2017 - Number 1
Year of Publication: 2019
Authors:
Sreeja S. S.
Parasmani Pal
Prabhat Pandey

Sreeja S S., Parasmani Pal and Prabhat Pandey. Article: Network Security Analysis based on Authentication Techniques. IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research ICAIM 2017(1):5-10, February 2019. Full text available. BibTeX

@article{key:article,
	author = {Sreeja S. S. and Parasmani Pal and Prabhat Pandey},
	title = {Article: Network Security Analysis based on Authentication Techniques},
	journal = {IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research},
	year = {2019},
	volume = {ICAIM 2017},
	number = {1},
	pages = {5-10},
	month = {February},
	note = {Full text available}
}

Abstract

Unique—Network Security issues are currently getting to be critical as society is moving to advanced data age. Information security is the most extreme basic segment in guaranteeing safe transmission of data through the web. It involves approval of access to data in a system, controlled by the system manager. The assignment of Network security not just requires guaranteeing the security of end frameworks yet of the whole system. Verification is one of the essential and most generally methods for finding out and guaranteeing security in the system. In this paper, an endeavour has been made to investigate the different verification systems, for example, Knowledge-based, Token-based and Biometric-based and so forth. Moreover, we consider multi-calculate confirmations by picking a mix of above procedures and attempt to compare them

References

  • http://www. authenticationworld. com/Token-Authentication.
  • http://www. authenticationworld. com/Authentication-Biometrics.
  • http://www. duosecurity. com.
  • http://ids. nic. in/technical_letter/TNL_JCES_JUL_2013/Advance%20Authentication%20Technique. pdf