In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover: namely, re-authentication and pre-authentication. We provide a detailed analysis of each mechanism, and highlight key performance trade-offs for select scenarios and parameters of interest. Categories and Subject Descriptors B.8.2 [Performance and Reliability]: Performance Analysis and Design Aids; E.3 [Data Encryption]: Standards General Terms Security, Standardization, Performance Keywords Authentication, Pre-authentication, Re-authentication, Handover, EAP, Performance