Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted third parties, but rather using a minimum of work by human user(s) implementing the low-band width unspoofable channels betwe...
Main Authors: | , |
---|---|
פורמט: | Journal article |
שפה: | English |
יצא לאור: |
Elsevier
2008
|