ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A STUDY ON DIFFERENT TYPES OF AUTHENTICATION TECHNIQUES IN DATA SECURITY

Journal: International Journal of Civil Engineering and Technology (IJCIET) (Vol.8, No. 12)

Publication Date:

Authors : ;

Page : 194-201

Keywords : Authentication; Loot; Robust; Security; Violators;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In the current era, all of our data are secured by some security mechanisms because of some intruders, violators or trespassers as they pilfer the data and gain access to it which may lead to a huge issue for the users. These data are looted by creating a security breach in the system or tracing the data during transactions or by decrypting the data with some decryption algorithms, etc. Authentication plays an important role in security. To create an effective security and save the data from getting looted, different authentication techniques are used. These authentication techniques should withstand all the security breach, should not allow the violators to find the decrypt key. In this paper, we will discuss different types of authentication techniques to make the security more robust

Last modified: 2018-05-11 22:32:49