Monday, 2025-02-03, 1:53 PM
Welcome, Guest | RSS
Login form
Search

Authentication Protocol

               Identifying or validating username with password is called authentication. However if the same password is sent over the network intruder can gain access to the password. We will see some of the protocols which we studied and some which we did not study during our course work. Authorization is the process by which one determines whether a principal is allowed to perform an operation. Authorization is usually performed after the principal has been authenticated, and may be based on information local to the verifier, or based on authenticated statements by others [1].

Calendar
«  February 2025  »
SuMoTuWeThFrSa
      1
2345678
9101112131415
16171819202122
232425262728
Our poll
Rate my site
Total of answers: 3
Site friends
Statistics

Total online: 1
Guests: 1
Users: 0