Lesson 6

Authentication Applications

Topics

Appeared in previous exams

Appeared in previous exams

1 Write a note on Kerberos system that supports authentication in distributed system.

Similar questions

How does Kerberos work? Explain with example.

How flaw in TCP/IP can cause operating systems to become vulnerable? Also explain how Kerberos are used for authentication in windows.

Marks: 10 M

Year: Dec 13, May 14 & May 16

Answer: ... (more)
2 E-mail Security.

Mumbai University > COMPS > Sem 7 > Cryptography and System Security

Marks: 10 M

Year: Dec 13 & May 16

Answer: ... (more)
3 Give the format of X.509 digital certificate and explain the use of a digital signature in it.

Mumbai University > Computer Engineering > Sem 7 > Cryptography and System Security

Marks: 5 Marks

Year: Dec 2015

Answer: ... (more)
4 How does PGP achieve confidentially and authentication in emails?

Mumbai University > Computer Engineering > Sem 7 > Cryptography and System Security

Marks: 5 Marks

Year: Dec 2015

Answer: ... (more)
5 Explain working of Kerberos.

Mumbai University > Computer Engineering > Sem 7 > Cryptography and System Security

Marks: 10 Marks

Year: May 2016

Answer: ... (more)
6 Write short note on email security

Mumbai University > Computer Engineering > Sem 7 > Cryptography and System Security

Marks: 5 Marks

Year: May 2016

Answer: ... (more)