Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/d8/2c/65/d82c653b-8c4f-de44-221a-c8f0756b2c62/mza_10622313844242288062.jpg/600x600bb.jpg
Revision
TheLidlMan
13 episodes
4 days ago
Revision Podcast for Computer Science at RHUL
Show more...
Courses
Education
RSS
All content for Revision is the property of TheLidlMan and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Revision Podcast for Computer Science at RHUL
Show more...
Courses
Education
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/43537359/43537359-1745533121096-41734515e8dfc.jpg
4) Authentication - IY2760 - Informational Security
Revision
24 minutes 20 seconds
6 months ago
4) Authentication - IY2760 - Informational Security

Information security concepts, particularly concerning authentication and key establishment, are explored across these documents. The EMV source details the chip and PIN standard for payment cards, outlining authentication methods and the underlying public key infrastructure. The authentication document examines various techniques for verifying identities, including passwords, challenge-response systems, and biometrics, alongside modern identity systems. GSM authentication provides a case study of security measures within mobile communications. Finally, key establishment covers methods for securely sharing secret keys, such as pre-distribution, distribution protocols like Kerberos, and key agreement schemes like Diffie-Hellman.

Revision
Revision Podcast for Computer Science at RHUL