Weak authentication: How to authenticate unknown principals without trusted parties

J Arkko*, P Nikander

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

10 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Weak authentication: How to authenticate unknown principals without trusted parties'. Together they form a unique fingerprint.