The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Taxonomies of User-Authentication Methods in Computer Networks
Abstract
This chapter outlines classifications of user-authentication methods based on five different taxonomies. The outlined taxonomies are: user identification-based taxonomy, authentication methodology-based taxonomy, authentication quality-based taxonomy, authentication complexity-based taxonomy, and authentication scope-based taxonomy. Administration of user authentication is briefly discussed. A technical survey of different user-authentication methods and elements of a user-authentication method is also given. User-identification methods such as passwords, tokens, and biometric methods are described. Proposed and implemented user-authentication protocols to overcome security weaknesses of the basic password authentication are surveyed. New user-authentication protocols such as PANA and SOLA are also included. Protocols and software for user registration as well as centralized user authentication are presented and compared.
Related Content
Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini.
© 2024.
14 pages.
|
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
30 pages.
|
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan.
© 2024.
19 pages.
|
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi.
© 2024.
14 pages.
|
Meryeme Bououchma, Brahim Herrou.
© 2024.
14 pages.
|
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
16 pages.
|
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly.
© 2024.
10 pages.
|
|
|