[go: up one dir, main page]

Prakash et al., 2018 - Google Patents

Authentication protocols and techniques: a survey

Prakash et al., 2018

View PDF
Document ID
2804243532111207454
Author
Prakash A
Kumar U
Publication year
Publication venue
Int. J. Comput. Sci. Eng

External Links

Snippet

Authentication is the process of confirming the authenticity of a client to identify its validity. If the user is valid then server permits the accessibility of its assets. Many authentication techniques and protocols are available to protect the server‟ s assets from getting …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
US8352739B2 (en) Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same
US10243742B2 (en) Method and system for accessing a device by a user
US7370350B1 (en) Method and apparatus for re-authenticating computing devices
US7707412B2 (en) Linked authentication protocols
KR101459802B1 (en) Delegation of authentication based on re-verification of encryption credentials
CN111866881B (en) Wireless LAN authentication method and wireless LAN connection method
Prakash et al. Authentication protocols and techniques: a survey
Fan et al. Complete EAP method: User efficient and forward secure authentication protocol for IEEE 802.11 wireless LANs
CN110020524A (en) A kind of mutual authentication method based on smart card
Sarvabhatla et al. A secure biometric-based user authentication scheme for heterogeneous WSN
Zhang et al. Is today's end-to-end communication security enough for 5g and its beyond?
Ali et al. A comparative study of authentication methods for wi-fi networks
CN101272379A (en) An Improved Method Based on IEEE802.1x Security Authentication Protocol
CN106230840B (en) A kind of command identifying method of high security
Zhu A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment.
Xie et al. Physical-unclonable-function-based lightweight three-factor authentication for multiserver architectures
Zhu et al. Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography.
Kumar et al. Analysis and literature review of IEEE 802.1 x (Authentication) protocols
Shojaie et al. Enhancing EAP-TLS authentication protocol for IEEE 802.11 i
Zhu Cryptanalysis and improvement of a mobile dynamic ID authenticated key agreement scheme based on chaotic maps
Liu et al. Extensible authentication protocols for IEEE standards 802.11 and 802.16
Gonzalez-Manzano et al. Access control for the cloud based on multi-device authentication
Zhang et al. Privacy-Preserving Blockchain-based User Authentication with Device Group Authorization for Mobile Edge Computing
WO2023077280A1 (en) Certificate-less authentication and secure communication
Abdulrahman et al. MOBILE CLOUD COMPUTING SERVICES AUTHENTICATION SCHEME