Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey

One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public Key Infrastructure. An approach studied by a number of researchers is building security though human work creating a low-b...

وصف كامل

التفاصيل البيبلوغرافية
المؤلفون الرئيسيون: Nguyen, L, Roscoe, A
التنسيق: Journal article
اللغة:English
منشور في: 2011

مواد مشابهة