Existing Authentication Schemes Research Articles