Reverse authentication in financial transactions
New families of protocol based on communication over human-based side channels, permit secure pairing or group formation in ways that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in...
Main Authors: | , |
---|---|
Format: | Journal article |
Published: |
2010
|