User:Karjoth/Books/FS14-2


 * Identification & Authentication
 * Passwords
 * Password
 * Password strength
 * Simple Authentication and Security Layer
 * One-time password
 * S/KEY
 * Password policy


 * Cryptographic Hash Functions
 * Cryptographic hash function
 * SHA-1
 * SHA-2
 * Message authentication code
 * Digital signature
 * Key generation
 * Symmetric-key algorithm
 * Stream cipher
 * Block cipher
 * Access Control Matrix
 * Computer security model
 * File system permissions
 * Reference monitor