अमूर्त

Intensifying the Authentication Schemes To Fortify the Network Security: A Survey

R Wesley Porpatham, G. Jaspher W. Kathrine

The key elements for the hike in the global knowledge-sharing are the Networks and the Internet. The immense influence of the Internet is lessened for the reason that the Security of the communications over the internet is put at risk in various ways. To employ all the advantages of Networks, a Secure Network Architecture is in need. Among the various security domains, Network Security is of a major concern. The dynamic fluctuations in the behavior of Networks, yields a wide range of attacks that open doors for the bogus users to exploit the resources, illegitimately. Authentication is the possible first-line of defense in any Networks for one entity to confirm its communicator to be legal. This Survey explains the various Authentication Schemes that are being practiced. The methodologies of the authentication schemes are discussed, their success and failures are studied and the various attacks that breaks them are traced.

अस्वीकृति: इस सारांश का अनुवाद कृत्रिम बुद्धिमत्ता उपकरणों का उपयोग करके किया गया है और इसे अभी तक समीक्षा या सत्यापित नहीं किया गया है।

में अनुक्रमित

Academic Keys
ResearchBible
CiteFactor
Cosmos IF
RefSeek
Hamdard University
World Catalogue of Scientific Journals
Scholarsteer
International Innovative Journal Impact Factor (IIJIF)
International Institute of Organised Research (I2OR)
Cosmos

और देखें