Cryptography Based Authentication Methods

Mohammad A. Alia, Abdelfatah Aref Tamimi, and Omaima N. A. AL-Allaf

Proceedings of the World Congress on Engineering and Computer Science 2014 Vol I
WCECS 2014, 22-24 October, 2014, San Francisco, USA

Abstract—This paper reviews a comparison study on the
most common used authentication methods. Some of these
methods are actually based on cryptography. In this study, we
show the main cryptographic services. As well as, this study
presents a specific discussion about authentication service.
Since the authentication service is classified into several
categorizes according to their methods. However, this study
gives more about the real life example for each of the
authentication methods. It talks about the simplest
authentication methods as well about the available biometric
authentication methods such as voice, iris, fingerprint, and face
authentication.

 

Comments are closed.

Thanks for downloading!

Top