Overview - Authentication
Background Concepts
A Walkthrough of Shared-Secret Authentication Protocols
Intercell Authentication