{"title":"Analysis of the Efficiency of Different Remote User and Server Authentication Schemes","authors":"C. Koner, C. Bhunia, U. Maulik","doi":"10.1109/ICFCC.2009.144","DOIUrl":null,"url":null,"abstract":"Authentication in sending information is a great research challenge. Many different authentication schemes have been invented to improve the security and efficiency due to increasing of threats and attacks with the increasing volume of traffic. There is a need for analysis the efficiency and security of authentication schemes to apply them in specific application. For this purpose, an analysis of few authentication schemes is made with several parameters of interest in this paper. We observe that no scheme is suitable for all applications neither any application is suitable invariably.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Future Computer and Communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFCC.2009.144","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Authentication in sending information is a great research challenge. Many different authentication schemes have been invented to improve the security and efficiency due to increasing of threats and attacks with the increasing volume of traffic. There is a need for analysis the efficiency and security of authentication schemes to apply them in specific application. For this purpose, an analysis of few authentication schemes is made with several parameters of interest in this paper. We observe that no scheme is suitable for all applications neither any application is suitable invariably.