Wednesday, 2025-09-03, 7:26 AM
Welcome, Guest | RSS
Login form
Search

Authentication Protocol

               Identifying or validating username with password is called authentication. However if the same password is sent over the network intruder can gain access to the password. We will see some of the protocols which we studied and some which we did not study during our course work. Authorization is the process by which one determines whether a principal is allowed to perform an operation. Authorization is usually performed after the principal has been authenticated, and may be based on information local to the verifier, or based on authenticated statements by others [1].

Calendar
«  September 2025  »
SuMoTuWeThFrSa
 123456
78910111213
14151617181920
21222324252627
282930
Our poll
Rate my site
Total of answers: 3
Site friends
Statistics

Total online: 1
Guests: 1
Users: 0