1. Research and discuss the much-talked-about role of public-key authentication in the future of e-commerce. Is the role of PKI in authentication exaggerated?
2. Study the dial-in authentication mechanisms. What mechanisms (discuss five) can be used in EAP?
3. Discuss the bene fits of enhancement of basic authentication with a cryptographic scheme such as Kerberos, SSL, and others. Give specific examples.