Prakash et al., 2018 - Google Patents
Authentication protocols and techniques: a surveyPrakash et al., 2018
View PDF- Document ID
- 2804243532111207454
- Author
- Prakash A
- Kumar U
- Publication year
- Publication venue
- Int. J. Comput. Sci. Eng
External Links
Snippet
Authentication is the process of confirming the authenticity of a client to identify its validity. If the user is valid then server permits the accessibility of its assets. Many authentication techniques and protocols are available to protect the server‟ s assets from getting …
- 238000000034 method 0 title abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8352739B2 (en) | Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same | |
US10243742B2 (en) | Method and system for accessing a device by a user | |
US7370350B1 (en) | Method and apparatus for re-authenticating computing devices | |
US7707412B2 (en) | Linked authentication protocols | |
KR101459802B1 (en) | Delegation of authentication based on re-verification of encryption credentials | |
CN111866881B (en) | Wireless LAN authentication method and wireless LAN connection method | |
Prakash et al. | Authentication protocols and techniques: a survey | |
Fan et al. | Complete EAP method: User efficient and forward secure authentication protocol for IEEE 802.11 wireless LANs | |
CN110020524A (en) | A kind of mutual authentication method based on smart card | |
Sarvabhatla et al. | A secure biometric-based user authentication scheme for heterogeneous WSN | |
Zhang et al. | Is today's end-to-end communication security enough for 5g and its beyond? | |
Ali et al. | A comparative study of authentication methods for wi-fi networks | |
CN101272379A (en) | An Improved Method Based on IEEE802.1x Security Authentication Protocol | |
CN106230840B (en) | A kind of command identifying method of high security | |
Zhu | A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment. | |
Xie et al. | Physical-unclonable-function-based lightweight three-factor authentication for multiserver architectures | |
Zhu et al. | Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography. | |
Kumar et al. | Analysis and literature review of IEEE 802.1 x (Authentication) protocols | |
Shojaie et al. | Enhancing EAP-TLS authentication protocol for IEEE 802.11 i | |
Zhu | Cryptanalysis and improvement of a mobile dynamic ID authenticated key agreement scheme based on chaotic maps | |
Liu et al. | Extensible authentication protocols for IEEE standards 802.11 and 802.16 | |
Gonzalez-Manzano et al. | Access control for the cloud based on multi-device authentication | |
Zhang et al. | Privacy-Preserving Blockchain-based User Authentication with Device Group Authorization for Mobile Edge Computing | |
WO2023077280A1 (en) | Certificate-less authentication and secure communication | |
Abdulrahman et al. | MOBILE CLOUD COMPUTING SERVICES AUTHENTICATION SCHEME |