Sunday, 2026-04-19, 2:21 PM
Welcome, Guest | RSS
Login form
Search

Authentication Protocol

               Identifying or validating username with password is called authentication. However if the same password is sent over the network intruder can gain access to the password. We will see some of the protocols which we studied and some which we did not study during our course work. Authorization is the process by which one determines whether a principal is allowed to perform an operation. Authorization is usually performed after the principal has been authenticated, and may be based on information local to the verifier, or based on authenticated statements by others [1].

Calendar
«  April 2026  »
SuMoTuWeThFrSa
   1234
567891011
12131415161718
19202122232425
2627282930
Our poll
Rate my site
Total of answers: 3
Site friends
Statistics

Total online: 1
Guests: 1
Users: 0