First page Back Continue Last page Overview Graphics
What this talk is not about
Details of Penn’s Kerberos deployment plans
- How to get PennKeys, which Kerberos enabled applications do I need to use
Writing Kerberized applications
In-depth protocol details and packet formats
Number Theory & Cryptography