Abstract
This paper discusses "weak authentication" techniques to provide cryptographically strong authentication between previously unknown parties without relying on trusted third parties.
Original language | English |
---|---|
Title of host publication | SECURITY PROTOCOLS |
Editors | B Christianson, B Crispo, JA Malcolm, M Roe |
Publisher | SPRINGER |
Pages | 5-16 |
Number of pages | 12 |
ISBN (Print) | 3-540-20830-5 |
Publication status | Published - 2003 |
MoE publication type | A4 Article in a conference publication |
Event | International Workshop on Security Protocols - Cambridge, United Kingdom Duration: 17 Apr 2002 → 19 Apr 2002 Conference number: 10 |
Publication series
Name | LECTURE NOTES IN COMPUTER SCIENCE |
---|---|
Publisher | SPRINGER-VERLAG BERLIN |
Volume | 2845 |
ISSN (Print) | 0302-9743 |
Workshop
Workshop | International Workshop on Security Protocols |
---|---|
Country/Territory | United Kingdom |
City | Cambridge |
Period | 17/04/2002 → 19/04/2002 |