This paper discusses "weak authentication" techniques to provide cryptographically strong authentication between previously unknown parties without relying on trusted third parties. © Springer-Verlag Berlin Heidelberg 2004.
CITATION STYLE
Arkko, J., & Nikander, P. (2003). Weak authentication: How to authenticate unknown principals without trusted parties. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2845, 5–19. https://doi.org/10.1007/978-3-540-39871-4_3
Mendeley helps you to discover research relevant for your work.