IDENTIFICATION AND AUTHENTICATION

Authors

  • Orzikul Shukurov Author

Keywords:

Key words: network, DES algorithm, authentication, time synchronization, one- time password-based authentication, Security.

Abstract

Annotation:  One  of  the  most  common  authentication  schemes  is  simple 
authentication, which is based on the use of traditional multi-factor passwords. The 
procedure for simple authentication of a user on a network can be imagined as follows. 
A user trying to use the network types his or her ID and password on a computer 
keyboard. 

References

Literature

1. https://www.researchgate.net/publication/319536428_Identification_and_Authenti

cation

2. Blessing, Moses & Olusegun, John. (2024). The Impact of Software-Defined

Networking (SDN) on Traditional Network Architectures: Opportunities and

Challenges.

3. Danish, Muhammad & Shahid, Shaheryar & Ghafar, Abdul & Hamid, Khalid &

Ali, Noman & Ghani, Amarah & Ibrar, Muhammad & Mandan, Sikandar. (2025).

Security of Next-Generation Networks: A Hybrid Approach Using ML-Algorithm

and Game Theory with SDWSN. 3. 18-36. 10.63075/wdpwrr31.

Published

2025-06-03

How to Cite

Orzikul Shukurov. (2025). IDENTIFICATION AND AUTHENTICATION . Ta’lim Innovatsiyasi Va Integratsiyasi, 46(3), 8-11. https://scientific-jl.com/tal/article/view/18263