International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 131 - Number 9 |
Year of Publication: 2015 |
Authors: Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare |
10.5120/ijca2015907389 |
Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare . An Overview of Various Authentication Methods and Protocols. International Journal of Computer Applications. 131, 9 ( December 2015), 25-27. DOI=10.5120/ijca2015907389
Nowadays, various online as well as offline activities have become an integral part of everyone’s life. So, need for the security has increased drastically. For the secure communication, authentication of the connecting party is one of the prime factors. Many techniques and methods are available for authentication. This paper gives an overview of different methods and protocols of authentication, as well as their reliability in today’s world.