Title :
Authentication in computer networks and proposal of one-time increase of user permissions
Author_Institution :
Fac. of Electr. Eng. & Commun., Brno Univ., Brno, Czech Republic
Abstract :
This article deals with authentication protocols based on secret password information. Basic authentication methods are explained in protocols PAP, CHAP and EAP and used in security system C4. Further, the article points to the absence of a protocol that would not only be able to authenticate the entity, but also allocate special one-time user permissions. Possible solution for this problem and its use in particular computer networks including potential advantages and disadvantages can be also found in the article.
Keywords :
computer network security; cryptographic protocols; CHAP protocol; EAP protocol; PAP protocol; authentication protocol; basic authentication methods; computer network; secret password information; security system; user permission; Authentication; Computer networks; Encryption; Object recognition; Protocols; Servers; Authentication; C4; CHAP; EAP; one-time change in permissions;
Conference_Titel :
Telecommunications and Signal Processing (TSP), 2013 36th International Conference on
Conference_Location :
Rome
Print_ISBN :
978-1-4799-0402-0
DOI :
10.1109/TSP.2013.6613905