CFP last date
20 January 2025
Reseach Article

Network Security Analysis based on Authentication Techniques

Published on February 2019 by Sreeja S. S., Parasmani Pal, Prabhat Pandey
Leveraging Information Technology for Inter-Sectoral Research
Foundation of Computer Science USA
ICAIM2017 - Number 1
February 2019
Authors: Sreeja S. S., Parasmani Pal, Prabhat Pandey
7561c24f-734d-49f9-b3b3-370cb08878fc

Sreeja S. S., Parasmani Pal, Prabhat Pandey . Network Security Analysis based on Authentication Techniques. Leveraging Information Technology for Inter-Sectoral Research. ICAIM2017, 1 (February 2019), 5-10.

@article{
author = { Sreeja S. S., Parasmani Pal, Prabhat Pandey },
title = { Network Security Analysis based on Authentication Techniques },
journal = { Leveraging Information Technology for Inter-Sectoral Research },
issue_date = { February 2019 },
volume = { ICAIM2017 },
number = { 1 },
month = { February },
year = { 2019 },
issn = 0975-8887,
pages = { 5-10 },
numpages = 6,
url = { /proceedings/icaim2017/number1/30381-1702/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Leveraging Information Technology for Inter-Sectoral Research
%A Sreeja S. S.
%A Parasmani Pal
%A Prabhat Pandey
%T Network Security Analysis based on Authentication Techniques
%J Leveraging Information Technology for Inter-Sectoral Research
%@ 0975-8887
%V ICAIM2017
%N 1
%P 5-10
%D 2019
%I International Journal of Computer Applications
Abstract

Unique—Network Security issues are currently getting to be critical as society is moving to advanced data age. Information security is the most extreme basic segment in guaranteeing safe transmission of data through the web. It involves approval of access to data in a system, controlled by the system manager. The assignment of Network security not just requires guaranteeing the security of end frameworks yet of the whole system. Verification is one of the essential and most generally methods for finding out and guaranteeing security in the system. In this paper, an endeavour has been made to investigate the different verification systems, for example, Knowledge-based, Token-based and Biometric-based and so forth. Moreover, we consider multi-calculate confirmations by picking a mix of above procedures and attempt to compare them

References
  1. http://www. authenticationworld. com/Token-Authentication.
  2. http://www. authenticationworld. com/Authentication-Biometrics.
  3. http://www. duosecurity. com.
  4. http://ids. nic. in/technical_letter/TNL_JCES_JUL_2013/Advance%20Authentication%20Technique. pdf
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Analysis