|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 124 - Issue 7 |
| Published: August 2015 |
| Authors: Pratik Singh, Bhawna Mallick |
10.5120/ijca2015905516
|
Pratik Singh, Bhawna Mallick . Evolution of Various Authentication Schemes in Wireless Network over a Decade. International Journal of Computer Applications. 124, 7 (August 2015), 5-9. DOI=10.5120/ijca2015905516
@article{ 10.5120/ijca2015905516,
author = { Pratik Singh,Bhawna Mallick },
title = { Evolution of Various Authentication Schemes in Wireless Network over a Decade },
journal = { International Journal of Computer Applications },
year = { 2015 },
volume = { 124 },
number = { 7 },
pages = { 5-9 },
doi = { 10.5120/ijca2015905516 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2015
%A Pratik Singh
%A Bhawna Mallick
%T Evolution of Various Authentication Schemes in Wireless Network over a Decade%T
%J International Journal of Computer Applications
%V 124
%N 7
%P 5-9
%R 10.5120/ijca2015905516
%I Foundation of Computer Science (FCS), NY, USA
Openness of wireless network makes it more sensible for various security attacks. Authentication is the most vital procedure to make sure that the service is appropriately used. It is a way of confirming the genuineness of a party by another party. There is a wide range of authentication schemes that varies according to time period. This paper, focus on the authentication schemes in wireless network that have evolved in last one a decade.