Tuesday, 2026-01-13, 6:12 AM
Welcome, Guest | RSS
Login form
Search

Authentication Protocol

               Identifying or validating username with password is called authentication. However if the same password is sent over the network intruder can gain access to the password. We will see some of the protocols which we studied and some which we did not study during our course work. Authorization is the process by which one determines whether a principal is allowed to perform an operation. Authorization is usually performed after the principal has been authenticated, and may be based on information local to the verifier, or based on authenticated statements by others [1].

Calendar
«  January 2026  »
SuMoTuWeThFrSa
    123
45678910
11121314151617
18192021222324
25262728293031
Our poll
Rate my site
Total of answers: 3
Site friends
Statistics

Total online: 1
Guests: 1
Users: 0