Cryptography Based Authentication Methods

In this paper, the authors review a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this paper, they show the main cryptographic services. As well as, this paper presents a specific discussion about authentication service. Since the authentication service is classified into several categorizes according to their methods. However, this paper gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
International Association of Engineers
Topic:
Security
Format:
PDF