This document is a term paper that explores various authentication protocols used in distributed systems, categorizing them based on cryptographic approaches and the involvement of trusted third parties. It outlines the flaws found in many well-known protocols over time and provides a survey of authentication mechanisms, such as symmetric and public key methods, as well as cookie-based authentication scenarios. The paper concludes with discussions on vehicular ad hoc networks and different authentication strategies, including TESLA and silent authentication methods.