In this chapter: We will continue our discussion on Needham-Schroeder Protocol and will see how does it work, digital signature standard (DSS) and digital signature algorithm (DSA) will be discussed, we will talk about authentication applications, and will study kerberos which is an authentication service developed at MIT. | Lecture Network security Chapter 24 - Dr. Munam Ali Shah