ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Network Security Analysis Based on Authentication Techniques?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 6)

Publication Date:

Authors : ; ;

Page : 11-18

Keywords : Authentication; Denial of service; Virtual Private Network; Passcode; Smart card; RSA; SecureID; Biometric;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Network Security issues are now becoming important as society is moving to digital information age. Data security is the utmost critical component in ensuring safe transmission of information through the internet. It comprises authorization of access to information in a network, controlled by the network administrator. The task of Network security not only requires ensuring the security of end systems but of the entire network. Authentication is one of the primary and most commonly ways of ascertaining and ensuring security in the network. In this paper, an attempt has been made to analyze the various authentication techniques such as Knowledge-based, Token-based and Biometric-based etc. Furthermore, we consider multi-factor authentications by choosing a combination of above techniques and try to compare them.

Last modified: 2014-06-04 23:42:30