The document discusses various authentication protocols including: - Reusable passwords which store hashed passwords but are vulnerable to theft - One-time passwords which generate new passwords each time to prevent reuse of stolen passwords - Challenge-response authentication which uses cryptographic functions to verify identity without transmitting passwords - Public key authentication which uses digital signatures to authenticate users based on their private/public key pairs - Kerberos which uses tickets and session keys issued by a trusted server to allow authentication between users and services on an network