A General Approach of Authentication Scheme and its Comparative Study (original) (raw)

A Review on Authentication Methods

Christophe Rosenberger

HAL (Le Centre pour la Communication Scientifique Directe), 2013

View PDFchevron_right

Intensifying the Authentication Schemes ToFortify the Network Security: A Survey

Wesley Porpatham

2014

View PDFchevron_right

Web access authentication systems and their security parameters

ANKIT PANDEY

International journal of applied research, 2016

View PDFchevron_right

A Survey on Various Security Techniques Used For Authentication

Mayank Bhatt

International Journal of Innovative Research in Science, Engineering and Technology, 2016

View PDFchevron_right

Analysis of Security Protocols for Authentication in Distributed Systems “

Orhan Gemikonakli

2005

View PDFchevron_right

IJERT-A Taxonomy of Authentication Techniques for Web Services

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2014

View PDFchevron_right

An Approach of Cryptography for Web User Authentication using Secure Remote Password Protocol

Vivek Parganiha

2012

View PDFchevron_right

A Cryptographic Mutual Authentication Scheme for Web Applications

Asimi Ahmed

International Journal of Network Security & Its Applications, 2014

View PDFchevron_right

Cryptography Based Authentication Methods

dr abdelfatah tamimi

View PDFchevron_right

Analysis of the Efficiency of Different Remote User and Server Authentication Schemes

Chandan koner

2009

View PDFchevron_right

A survey of authentication protocol literature: Version 1.0

John Clark

1997

View PDFchevron_right

Authentication Methods for Computer Systems Security

Moshe Zviran

Encyclopedia of Information Science and Technology, Second Edition

View PDFchevron_right

COMPARATIVE ANALYSIS OF AUTHENTICATION AND AUTHORIZATION SECURITY IN DISTRIBUTED SYSTEM

eSAT Journals

View PDFchevron_right

IMPROVED AUTHENTICATION TECHNIQUE - Srinadh swamy

IASET US

View PDFchevron_right

Authentication Methods: A Conceptual Review

Simran Malhotra

2020

View PDFchevron_right

COMPARATIVE STUDY OF DIFFERENT AUTHENTICATION AND IDENTIFICATION ALGORITHMS IN SECURED CRYPTOGRAPHY

IJESRT Journal

View PDFchevron_right

AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD

Dr. Sanjeev K U M A R Mandal

View PDFchevron_right

An authentication model based on cryptography

Ahmed AL Arjan

2021

View PDFchevron_right

Authentication systems: A literature review and classification

sarmina Samad

View PDFchevron_right

Computing and Information Systems]: Security and Protection – Authentication

Hulisani Ratshinanga

2008

View PDFchevron_right

A secure and efficient user authentication scheme for the web

yassine sadqi

International Journal of Internet Technology and Secured Transactions, 2015

View PDFchevron_right

An enhanced user authentication scheme for multi-server Internet services

Woei-Jiunn Tsaur

Applied Mathematics and Computation, 2005

View PDFchevron_right

Designing a Novel Two-Tier Authentication Algorithm for Web Service Architecture

Resul DAŞ

Journal of Telecommunication, Electronic and Computer Engineering, 2016

View PDFchevron_right

A Study on the Security of Authentication Systems

Otuekong Umoren

2021

View PDFchevron_right

HTTP Authentication: Basic and Digest Access Authentication

Paul J Leach

1999

View PDFchevron_right

An Enhanced Authentication System using Multi-Level Security for web Services

International Journal IJRITCC

View PDFchevron_right

Attacks and Countermeasures for Secure User Authentication Mechanisms

Parwinder Dhillon

2021

View PDFchevron_right

Systematic design of a family of attack-resistant authentication protocols

Moti Yung

IEEE Journal on Selected Areas in Communications, 1993

View PDFchevron_right

MO-Auth: A Novel Approach for Authentication in Modern Applications

Syed Taimoor Ali

IJARIIT, 2023

View PDFchevron_right