A Survey on User Authentication Techniques
Autor: | Vinjamuri Janaki, Aitha Nagaraju, K. Sharmila |
---|---|
Rok vydání: | 2017 |
Předmět: |
Challenge-Handshake Authentication Protocol
020203 distributed computing User authentication business.industry Computer science 05 social sciences Internet privacy 050301 education Email authentication 02 engineering and technology Multi-factor authentication Computer security computer.software_genre ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS Authentication protocol 0202 electrical engineering electronic engineering information engineering business 0503 education computer |
Zdroj: | Oriental journal of computer science and technology. 10:513-519 |
ISSN: | 2320-8481 0974-6471 |
DOI: | 10.13005/ojcst/10.02.37 |
Popis: | Confidentiality and Authentication were once treated different but now-a-days, improvement in technology is demanding both of them to be used together. Though technology is increasing tremendously, smart hackers on the environment always challenges the authentication factors, thereby enforcing more number of factors for authentication to be included. As factors increase, failure rate for authentication may also be more when any one of the factors doesn’t work. A qualitative survey of user authentication systems being used in today’s environment is presented here and a comparative study of various authentication mechanisms used in the world of Information security by various researchers is shown. |
Databáze: | OpenAIRE |
Externí odkaz: |