Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public Key Infrastructure. An approach studied by a number of researchers is building security though human work creating a low-b...
المؤلفون الرئيسيون: | Nguyen, L, Roscoe, A |
---|---|
التنسيق: | Journal article |
اللغة: | English |
منشور في: |
2011
|
مواد مشابهة
-
Authentication protocols based on low−bandwidth unspoofable channels: a comparative survey
حسب: Nguyen, L, وآخرون
منشور في: (2011) -
Authentication protocols based on low−bandwidth unspoofable channels: a comparative survey
حسب: Nguyen, L, وآخرون
منشور في: (2011) -
Efficient group authentication protocols based on human interaction
حسب: Roscoe, A, وآخرون
منشور في: (2006) -
Efficient group authentication protocol based on human interaction
حسب: Nguyen, L, وآخرون
منشور في: (2006) -
On the construction of digest functions for manual authentication protocols
حسب: Nguyen, L, وآخرون
منشور في: (2011)