2.2 Authentication and Security Applications