International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 105 | Views: 294

Survey Paper | Information Technology | India | Volume 4 Issue 2, February 2015 | Popularity: 6.6 / 10


     

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale


Abstract: Today Mobiles, Computer, Laptops, PDAs are becoming widely popular and largely used. The available authentication techniques are able to secure the device or the area by the use of Knowledge, Possession and Inherence factor. When the use of smart phones for authentication comes into consideration, it becomes a critical task because of complexity, security and the various fluctuations in the wireless medium. The various successful authentication systems in existence are dedicated fingerprint scanner, iris scanner and CCTV, etc. This paper provides the review for various existing authentication methods. Here we have listed authentication methods under the three main categories, first is an Integrated Windows Authentication, where the communication is done with the trusted Kerberos server to obtain a shared secret key. The second is a Basic Authentication system consisting of username/password and trust authentication. The third form of authentication system is a Multifactor Authentication method that is a process of computer access control in which combination of any two from possession, knowledge and Inherence is used to access the system or the area. The methods are discussed in detail throughout the paper.


Keywords: Authentication Modes, Biometrics, Multifactor Authentication, Face Recognition, Comparing Authentication Modes


Edition: Volume 4 Issue 2, February 2015


Pages: 1307 - 1311



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Vyanktesh Dorlikar, Anjali Chandavale, "A Survey on Authentication Techniques and User Recognition", International Journal of Science and Research (IJSR), Volume 4 Issue 2, February 2015, pp. 1307-1311, URL: https://www.ijsr.net/getabstract.php?paperid=SUB151417, DOI: https://www.doi.org/10.21275/SUB151417



Downloads: 357 | Views: 1000

Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir


Downloads: 301 | Views: 558

Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi


Downloads: 266 | Views: 407

Information Technology, China, Volume 9 Issue 1, January 2020

Pages: 107 - 112

Network Optimization using Multi-Agent Genetic Algorithm

Sikandar Hanif


Downloads: 260 | Views: 471

Information Technology, Malaysia, Volume 8 Issue 1, January 2019

Pages: 64 - 70

University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR

Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan


Downloads: 254 | Views: 418

Information Technology, India, Volume 9 Issue 1, January 2020

Pages: 477 - 479

IoT Based Smart Street Light for Energy Efficiency and Safety

Tanmay Patil, Arjun Ramendra


Top