Agenda
1. Introduction
2. Cryptographic Techniques
3. Kerberos
4. Kerberos-based AAIs
5. PKI
6. PKI-based AAIs
7. Comparison
8. Conclusions and Outlook
Previous slide
Next slide
Back to first slide
View graphic version