Survey for Generating an Ideal Password Authentication Scheme Which Results in Fortification of Transport Layer Security Protocol

Fortification of transport layer security protocol is required because whenever there is communication between Client and Server over a public link, then proving an identity becomes quiet complex. When resources are to be accessed from remote systems through public network then identity authentication parameters are the de-facto-standard. This paper elucidates upon various authentication parameters and generates a result that there is need for generating an ideal password authentication scheme. Analysis through a survey is done and outcome is formulated for efficient authentication type for online transactions.

Provided by: International Journal of Computer Science and Information Technologies Topic: Security Date Added: Mar 2012 Format: PDF

Find By Topic