You are on page 1of 1

1. Describe key distribution scenario.

2. Write short notes on the following

a) IEEE 802.11 protocol architecture b) IEEE 802.11i services and phases.

3. Describe about Kerberos

4. Analyze the following

a)virtual elections. b) Single sign on.

1. Describe different techniques proposed for the distribution of public keys.

2. Describe X.509 certificate format.

3. Analyze the following

a) Wireless security b) mobile security

4. Explain the following:

a) SSH b) HTTPS

Physical layer:

You might also like