The document discusses various authentication protocols including:
- Reusable passwords which store hashed passwords but are vulnerable to theft
- One-time passwords which generate new passwords each time to prevent reuse of stolen passwords
- Challenge-response authentication which uses cryptographic functions to verify identity without transmitting passwords
- Public key authentication which uses digital signatures to authenticate users based on their private/public key pairs
- Kerberos which uses tickets and session keys issued by a trusted server to allow authentication between users and services on an network