Authenticating ad hoc networks by comparison of short digests

We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted third parties, but rather using a minimum of work by human user(s) implementing the low-band width unspoofable channels betwe...

Disgrifiad llawn

Manylion Llyfryddiaeth
Prif Awduron: Nguyen, L, Roscoe, A
Fformat: Journal article
Iaith:English
Cyhoeddwyd: Elsevier 2008