Wednesday, 2026-03-04, 8:50 AM
Welcome, Guest | RSS
Login form
Search

Authentication Protocol

               Identifying or validating username with password is called authentication. However if the same password is sent over the network intruder can gain access to the password. We will see some of the protocols which we studied and some which we did not study during our course work. Authorization is the process by which one determines whether a principal is allowed to perform an operation. Authorization is usually performed after the principal has been authenticated, and may be based on information local to the verifier, or based on authenticated statements by others [1].

Calendar
«  March 2026  »
SuMoTuWeThFrSa
1234567
891011121314
15161718192021
22232425262728
293031
Our poll
Rate my site
Total of answers: 3
Site friends
Statistics

Total online: 1
Guests: 1
Users: 0