to establish a basic familiarity with authentication protocols for network security.
Write the following protocols. Clearly provide the notations and the description of the protocols and their analysis.
Study the authentication and key establishment protocol in the Mobile Communications LTE standard, and complete its related tasks.
Write a symmetric-key inter-domain end-to-end authentication protocols for a mobile system.