Authentication protocols based on low−bandwidth unspoofable channels: a comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public Key Infrastructure. An approach studied by a number of researchers is building security though human work creating a low-b...
Hlavní autoři: | , |
---|---|
Médium: | Journal article |
Vydáno: |
2011
|