This document summarizes and compares different authentication methods including Kerberos, X.509 certificates, and the use of nonces. It provides an overview of Kerberos versions 4 and 5, describing how Kerberos uses a central authentication server and ticket-granting tickets to allow users access to distributed services without trusting individual workstations. It also outlines X.509 authentication services, including how digital certificates issued by a certification authority can be used to verify a user's public key and how certification authorities are organized in a hierarchy. Finally, it discusses the use of nonces as time-varying parameters to prevent replay attacks in authentication protocols.