This shows you the differences between two versions of the page.
isc:lectures:03 [2024/10/18 16:25] florin.stancu |
isc:lectures:03 [2024/11/01 17:21] (current) florin.stancu |
||
---|---|---|---|
Line 7: | Line 7: | ||
[[https://docs.google.com/presentation/d/e/2PACX-1vS8hXROtTrLWRWbPnTbTatIITeWPA4eJWhDzt9uVA0p6f2XzSi_MID9tvPTmACVCA/pub?start=false&loop=false&delayms=60000 | Lecture 03 - Authentication and Key Establishment]] | [[https://docs.google.com/presentation/d/e/2PACX-1vS8hXROtTrLWRWbPnTbTatIITeWPA4eJWhDzt9uVA0p6f2XzSi_MID9tvPTmACVCA/pub?start=false&loop=false&delayms=60000 | Lecture 03 - Authentication and Key Establishment]] | ||
+ | === More resources === | ||
+ | |||
+ | * //[[https://people.scs.carleton.ca/~paulv/toolsjewels.html|Computer Security and the Internet: Tools and Jewels]]// => [[https://people.scs.carleton.ca/~paulv/toolsjewels/TJrev1/ch3-rev1.pdf|Chapter 3 (User Authentication, pdf)]] + [[https://people.scs.carleton.ca/~paulv/toolsjewels/TJrev1/ch4-rev1.pdf|Chapter 4 (Key Establishment, pdf)]] |