User Athentification [Emma Taieb, Ali Lariane, Romain Simeon] ref
Remote user-authentification principles
Remote user-authentification using symmetric encryption
Kerberos
Transport Layer Security [Nathan MBUMBA, Mehdi TAZEROUTI,Huijuan MA, Salim BOUSKINE] ref
TLS record protocol
Handshake protocol
Cryptographic computations
HTTPS
Secure Shell (SSH) [Balkis Mansour, Hiba Kezibri, Hinda Habib, Yacine-Samy Cherief] ref
Transport layer protocol
User authentification protocol
Connection protocol
Wireless Network security [3 étudiants] ref
Wireless security
Mobile device security
IEEE 802.11i Wireless LAN security
Electronic mail security [Brisson-Enjalbert Emi, Davenel Naïla, De Lavallade Gabrielle, Suresh Sabana] ref
Internet mail architecture & email formats
Email threats and security
S/MIME
Pretty good privacy
DNSSEC
IP security [3 étudiants] ref
IP security policy
Encapsulating security payload
Internet key exchange