{"title":"网络安全中的混合认证方法","authors":"Georgiana Crihan, M. Craciun, L. Dumitriu","doi":"10.35219/eeaci.2022.1.02","DOIUrl":null,"url":null,"abstract":"In this paper, we present a comprehensive taxonomy of the most popular authentication mechanisms, the main threats, vulnerabilities, the possible types of attacks and the security issues that are associated with computer systems. Our main contribution is to analyze the architecture of the current security environment from all aspects and to make a comparative assessment of different authentication methods in order to identify and develop a scalable and reliable mechanism that must deal with multi-level security and strong authentication requirements. We propose hybrid methods of authentication, which combine and integrate biometric technologies with cryptographic asymmetric algorithms, elements that play a vital role in the field of information security and aim to resolve the shortcomings of traditional methods of authentication and enhance the level of security.","PeriodicalId":43589,"journal":{"name":"Annals of the University Dunarea de Jos of Galati, Fascicle VI-Food Technology","volume":"6 1","pages":""},"PeriodicalIF":0.8000,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"HYBRID METHODS OF AUTHENTICATION IN NETWORK SECURITY\",\"authors\":\"Georgiana Crihan, M. Craciun, L. Dumitriu\",\"doi\":\"10.35219/eeaci.2022.1.02\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we present a comprehensive taxonomy of the most popular authentication mechanisms, the main threats, vulnerabilities, the possible types of attacks and the security issues that are associated with computer systems. Our main contribution is to analyze the architecture of the current security environment from all aspects and to make a comparative assessment of different authentication methods in order to identify and develop a scalable and reliable mechanism that must deal with multi-level security and strong authentication requirements. We propose hybrid methods of authentication, which combine and integrate biometric technologies with cryptographic asymmetric algorithms, elements that play a vital role in the field of information security and aim to resolve the shortcomings of traditional methods of authentication and enhance the level of security.\",\"PeriodicalId\":43589,\"journal\":{\"name\":\"Annals of the University Dunarea de Jos of Galati, Fascicle VI-Food Technology\",\"volume\":\"6 1\",\"pages\":\"\"},\"PeriodicalIF\":0.8000,\"publicationDate\":\"2023-02-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Annals of the University Dunarea de Jos of Galati, Fascicle VI-Food Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.35219/eeaci.2022.1.02\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"FOOD SCIENCE & TECHNOLOGY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Annals of the University Dunarea de Jos of Galati, Fascicle VI-Food Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.35219/eeaci.2022.1.02","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"FOOD SCIENCE & TECHNOLOGY","Score":null,"Total":0}
HYBRID METHODS OF AUTHENTICATION IN NETWORK SECURITY
In this paper, we present a comprehensive taxonomy of the most popular authentication mechanisms, the main threats, vulnerabilities, the possible types of attacks and the security issues that are associated with computer systems. Our main contribution is to analyze the architecture of the current security environment from all aspects and to make a comparative assessment of different authentication methods in order to identify and develop a scalable and reliable mechanism that must deal with multi-level security and strong authentication requirements. We propose hybrid methods of authentication, which combine and integrate biometric technologies with cryptographic asymmetric algorithms, elements that play a vital role in the field of information security and aim to resolve the shortcomings of traditional methods of authentication and enhance the level of security.