Download Now Free registration required
With the thriving evolution of information technology, network technology attains to maturity and Wireless Local Area Network (WLAN) becomes universal as well. To discipline the right of network usage, network system identifies users before providing network services or resources. In the historical researches, the conventional authentication mechanisms frequently adopted the names and passwords of users as login authentication. However, these Single Factor Authentication mechanisms are proved to be defective. In virtue of enhancing security, recent researches on authentication are built on Two-Factor Authentication schemes. Nevertheless, the expensive cost of building Two-Factor Authentication approaches has affected the will of users.
- Format: PDF
- Size: 344.22 KB