The resurrecting duckling — What next?

48Citations
Citations of this article
46Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of an online authentication server. We introduced the Resurrecting Duckling security policy model to address this problem. Master-slave relationships, however, do not exhaust the range of interesting interactions. We therefore extend the Duckling model to also cover relationships between peers.

Cite

CITATION STYLE

APA

Stajano, F. (2001). The resurrecting duckling — What next? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2133, pp. 204–214). Springer Verlag. https://doi.org/10.1007/3-540-44810-1_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free