Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/15025
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mehra R. | |
dc.contributor.author | Meshram A. | |
dc.contributor.author | Chandavarkar B.R. | |
dc.date.accessioned | 2021-05-05T10:16:14Z | - |
dc.date.available | 2021-05-05T10:16:14Z | - |
dc.date.issued | 2020 | |
dc.identifier.citation | 2020 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020 , Vol. , , p. - | en_US |
dc.identifier.uri | https://doi.org/10.1109/ICCCNT49239.2020.9225410 | |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/15025 | - |
dc.description.abstract | The most convenient and the simplest authentication method to deal with the important and secret data over an uncertain network is remote user authentication. For remote user authentication, a system call with a high-security network is required, which will help to identify whether the parties which are communicating are trustworthy and genuine. User and the server will be securely authenticated using remote user authentication, protecting and processing the communication in a user-friendly way, and provide security to the user by hiding their details. This paper discusses the different approaches in which a remote user authentication mechanism can be done and the issues in those methods, which will verify both the parties in a secure, simple, and convenient way. © 2020 IEEE. | en_US |
dc.title | Remote User Authentication and Issues: A Survey | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.