What are the description of sub protocols and what are the security needs for the same. What authentication is needed to do in that. What are the different security policies are used in this protocols. The common one is tcp and thus what are the same modes of different types of security authentical used under this. my main concern relies with the sub protocols.
Bookmarks