Survey for Generating an Ideal Password Authentication Scheme Which Results in Fortification of Transport Layer Security Protocol

Free registration required

Executive Summary

Fortification of transport layer security protocol is required because whenever there is communication between Client and Server over a public link, then proving an identity becomes quiet complex. When resources are to be accessed from remote systems through public network then identity authentication parameters are the de-facto-standard. This paper elucidates upon various authentication parameters and generates a result that there is need for generating an ideal password authentication scheme. Analysis through a survey is done and outcome is formulated for efficient authentication type for online transactions.

  • Format: PDF
  • Size: 1658.88 KB