Downloads

Comparative Study Of Different User Authentication Schemes

Authors

Aakansha S Wani, Komal Vanjari, Deepika Shinde ,Prof. Rajasree R.S1

Abstract

Authentication  is considered as a significance element of security to verify user’s identity. There are many authentication schemes that depend on user name /password ,but they are considered weak techniques of user authentication because they are prone to dictionary attack and man in middle attack , etc. A more secure scheme is 2 factor authentication that does not only verify the user name /password pair, but also needs a second factor such as a token device, biometric. This paper proposes the comparative study of different two and three factor authentication techniques, that can withstand common security attacks as well and has good performance of user authentication.

Article Details

Published

2015-12-28

Section

Articles

How to Cite

Comparative Study Of Different User Authentication Schemes. (2015). International Journal of Engineering and Computer Science, 4(12). http://ijecs.in/index.php/ijecs/article/view/2829