- B - Algoritmi
-
V - Varie
History of cryptography, Secret-key techniques, one-time pad, The DES algorithm
-
V - Varie
Public-key techniques, The RSA algorithm, Correctness and efficiency of RSA, Primality testing, Authentication, Digital signatures, Message integrity, Digest algorithms, Key escrow, Secret Sharing
- F - Sistemi operativi
-
V - Varie
User Authentication, Passwords, Spoofing, Dictionary attacks, Discretionary Access Control, Mandatory Access Control, Capabilities
- H - Computazione su rete
- *
SR - Sicurezza delle Reti
Trustworthiness, Security policies, Trust models, PGP, Technologies for secure channels, SSL
- *
SR - Sicurezza delle Reti
Phishing, Keylogger, Sniffing attacks, Smart Cards, Biometrics
- *
SR - Sicurezza delle Reti
Firewalls, Packet Filters, Proxy Servers, IPSec, Auditing, Intrusion Detection Systems