Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted third parties, but rather using a minimum of work by human user(s) implementing the low-band width unspoofable channels betwe...
Prif Awduron: | , |
---|---|
Fformat: | Journal article |
Iaith: | English |
Cyhoeddwyd: |
Elsevier
2008
|