Weak authentication: How to authenticate unknown principals without trusted parties

J Arkko*, P Nikander

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

10 Citations (Scopus)

Abstract

This paper discusses "weak authentication" techniques to provide cryptographically strong authentication between previously unknown parties without relying on trusted third parties.

Original languageEnglish
Title of host publicationSECURITY PROTOCOLS
EditorsB Christianson, B Crispo, JA Malcolm, M Roe
PublisherSPRINGER
Pages5-16
Number of pages12
ISBN (Print)3-540-20830-5
Publication statusPublished - 2003
MoE publication typeA4 Article in a conference publication
EventInternational Workshop on Security Protocols - Cambridge, United Kingdom
Duration: 17 Apr 200219 Apr 2002
Conference number: 10

Publication series

NameLECTURE NOTES IN COMPUTER SCIENCE
PublisherSPRINGER-VERLAG BERLIN
Volume2845
ISSN (Print)0302-9743

Workshop

WorkshopInternational Workshop on Security Protocols
Country/TerritoryUnited Kingdom
CityCambridge
Period17/04/200219/04/2002

Cite this