Authentication Methods and Protocols
- Critically analyse authentication methods to identify the key principles and future directions.
- Critically analyse and evaluate the social impact and commercial potential of identity and privacy issues involved with authentication.
- Write effectively to communicate observations, technical solutions, social issues and commercial ideas.
- Burnett, S., Paine, S. (2001). RSA security's official guide to cryptography. New York: McGraw-Hill Osborne.
- S. Kent (Ed., 2003), Who goes there? Authentication through the lens of privacy. Washington: National Academies Press.