In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of an online authentication server. We introduced the Resurrecting Duckling security policy model to address this problem. Master-slave relationships, however, do not exhaust the range of interesting interactions. We therefore extend the Duckling model to also cover relationships between peers.
CITATION STYLE
Stajano, F. (2001). The resurrecting duckling — What next? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2133, pp. 204–214). Springer Verlag. https://doi.org/10.1007/3-540-44810-1_27
Mendeley helps you to discover research relevant for your work.