Ranking of Authentication Schemes Based on Critical Limiting Factors

Download Now
Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
In any of the computing environment ranging from a traditional computing to the emerging service based computing, security and privacy has been an important consideration in the architecture. Particularly user authentication is an entry point to almost each and every application and services published. In this paper, user authentication has yielded several authentication schemes but the existing schemes focuses largely on the benefits rather than their downside in terms of security, usability and deploying ability, which are found to be ineffective when deployed in the real world.
Download Now

Find By Topic