Authentication methods specify how trust is established between computers. These authentication methods are offered and accepted ...