Authentication Methods and Protocols

Concepts of identity and privacy


  1. What are the primary elements in an authentication transaction?
  2. What are the key data privacy issues from these different perspectives?
    • Technical
    • Social
    • Personal
  3. Is usability a design requirement or comparative criterion of authentication systems?
  4. What kind of information were the writers trying to protect during the Renaissance?
  5. Which techniques did those writers use?
  6. For those writers, what is the difference between knowledge, identity and spirituality?
  7. For those writers, was secrecy valued more than openness? Which do you value more?
  8. What is the difference between intentional vs. inadvertent eavesdropping?
  9. How does the structure or architecture of a building affect eavesdropping?
  10. How is eavesdropping dependent on the flow of information?
  11. What is the most effective way to protect yourself from eavesdroppers?
  12. What are the risks for people who receive information by eavesdropping?
  13. How much of data security could be described as a form of eavesdropping?


Authentication participants

Authentication definition

Types of authentication

Concept of privacy

Some privacy issues

Usability design is authentication

Architecture is a form of authentication

Authentication in Anglesea building depends on functional purpose

Intellectual property could be a form of identity or a form of knowledge

Eavesdropping affects data in transit