Leveraging Information Technology for Inter-Sectoral Research |
Foundation of Computer Science USA |
ICAIM2017 - Number 1 |
February 2019 |
Authors: Sreeja S. S., Parasmani Pal, Prabhat Pandey |
7561c24f-734d-49f9-b3b3-370cb08878fc |
Sreeja S. S., Parasmani Pal, Prabhat Pandey . Network Security Analysis based on Authentication Techniques. Leveraging Information Technology for Inter-Sectoral Research. ICAIM2017, 1 (February 2019), 5-10.
Unique—Network Security issues are currently getting to be critical as society is moving to advanced data age. Information security is the most extreme basic segment in guaranteeing safe transmission of data through the web. It involves approval of access to data in a system, controlled by the system manager. The assignment of Network security not just requires guaranteeing the security of end frameworks yet of the whole system. Verification is one of the essential and most generally methods for finding out and guaranteeing security in the system. In this paper, an endeavour has been made to investigate the different verification systems, for example, Knowledge-based, Token-based and Biometric-based and so forth. Moreover, we consider multi-calculate confirmations by picking a mix of above procedures and attempt to compare them