A STUDY ON DIFFERENT TYPES OF AUTHENTICATION TECHNIQUES IN DATA SECURITY
Journal: International Journal of Civil Engineering and Technology (IJCIET) (Vol.8, No. 12)Publication Date: 2017-12-26
Authors : D. DINESH KUMAR K. VIJAY S. BHAVANI E. MALATHY R. MAHADEVAN;
Page : 194-201
Keywords : Authentication; Loot; Robust; Security; Violators;
Abstract
In the current era, all of our data are secured by some security mechanisms because of some intruders, violators or trespassers as they pilfer the data and gain access to it which may lead to a huge issue for the users. These data are looted by creating a security breach in the system or tracing the data during transactions or by decrypting the data with some decryption algorithms, etc. Authentication plays an important role in security. To create an effective security and save the data from getting looted, different authentication techniques are used. These authentication techniques should withstand all the security breach, should not allow the violators to find the decrypt key. In this paper, we will discuss different types of authentication techniques to make the security more robust
Other Latest Articles
- EXPERIMENTAL STUDY OF THE BEHAVIOR OF A STITCHED SANDWICH PLATE UNDER A RAPID DYNAMICS “SHOCK”
- INNOVATIVE GREEN APPROACH INFORMATICS TO MANAGING THERMAL SOURCES AND ITS EFFECT IN RESIDENTIAL BUILDINGS IN TROPICAL CLIMATE
- A STUDY ON CIVIL ENGINEERING STUDENTS PERCEPTION TOWARDS DEMONETIZATION IN GUNTUR DISTRICT, ANDHRA PRADESH
- AN EMPIRICAL ANALYSIS OF THE FACTORS AFFECTING THE WORK STRESS OF INDIAN MARINERS
- BEHAVIOUR OF STEEL FIBRE REINFORCED CONCRETE WITH BOTTOM ASH AS FINE AGGREGATE TO HEAT EXPOSURE
Last modified: 2018-05-11 22:32:49