User Athentification [3 étudiants] ref
Remote user-authentification principles
Remote user-authentification using symmetric encryption
Kerberos
Transport Layer Security [4 étudiants] ref
TLS record protocol
Handshake protocol
Cryptographic computations
HTTPS
Secure Shell (SSH) [4 étudiants] ref
Transport layer protocol
User authentification protocol
Connection protocol
Wireless Network security [3 étudiants] ref
Wireless security
Mobile device security
IEEE 802.11i Wireless LAN security
Electronic mail security [4 étudiants] ref
Internet mail architecture & email formats
Email threats and security
S/MIME
Pretty good privacy
DNSSEC
IP security [3 étudiants] ref
IP security policy
Encapsulating security payload
Internet key exchange