International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 105

Survey Paper | Information Technology | India | Volume 4 Issue 2, February 2015


A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale


Abstract: Today Mobiles, Computer, Laptops, PDAs are becoming widely popular and largely used. The available authentication techniques are able to secure the device or the area by the use of Knowledge, Possession and Inherence factor. When the use of smart phones for authentication comes into consideration, it becomes a critical task because of complexity, security and the various fluctuations in the wireless medium. The various successful authentication systems in existence are dedicated fingerprint scanner, iris scanner and CCTV, etc. This paper provides the review for various existing authentication methods. Here we have listed authentication methods under the three main categories, first is an Integrated Windows Authentication, where the communication is done with the trusted Kerberos server to obtain a shared secret key. The second is a Basic Authentication system consisting of username/password and trust authentication. The third form of authentication system is a Multifactor Authentication method that is a process of computer access control in which combination of any two from possession, knowledge and Inherence is used to access the system or the area. The methods are discussed in detail throughout the paper.


Keywords: Authentication Modes, Biometrics, Multifactor Authentication, Face Recognition, Comparing Authentication Modes


Edition: Volume 4 Issue 2, February 2015,


Pages: 1307 - 1311


How to Cite this Article?

Vyanktesh Dorlikar, Anjali Chandavale, "A Survey on Authentication Techniques and User Recognition", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB151417, Volume 4 Issue 2, February 2015, 1307 - 1311

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Biometrics'

Downloads: 2 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 102

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

Similar Articles with Keyword 'Face Recognition'

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article

Downloads: 102

Review Papers, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 1673 - 1675

Cross-Correlation Based Face Recognition Scheme ? A Review

Ranjeet Singh, Mandeep Kaur

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 2 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 8

Informative Article, Information Technology, India, Volume 10 Issue 7, July 2021

Pages: 63 - 81

Introduction to Cryptography

Bhavna Khosla

Share this Article

Similar Articles with Keyword 'Modes'

Downloads: 110

Research Paper, Information Technology, Namibia, Volume 6 Issue 5, May 2017

Pages: 1531 - 1537

A Framework to Assess the Impact of Information and Communication Technologies on Patient Records Management in Healthcare: A Case of Windhoek Central Hospital

Ronald Karon, Nomusa Dlodlo

Share this Article

Downloads: 132

Research Paper, Information Technology, Kenya, Volume 8 Issue 3, March 2019

Pages: 1490 - 1496

A Model for Fine Collection on Traffic Offenses in Kenya

Lazarus Wangwe Wekesa, Prof Gregory W. Wanyembi, Dr. Joyce W. Gikandi

Share this Article
Top