Authenticating ad hoc networks by comparison of short digests

We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted third parties, but rather using a minimum of work by human user(s) implementing the low-band width unspoofable channels betwe...

תיאור מלא

מידע ביבליוגרפי
Main Authors: Nguyen, L, Roscoe, A
פורמט: Journal article
שפה:English
יצא לאור: Elsevier 2008