Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties
暂无分享,去创建一个
[1] Dieter Gollmann,et al. Computer Security — ESORICS 94 , 1994, Lecture Notes in Computer Science.
[2] Frank Stajano,et al. The Resurrecting Duckling , 1999 .
[3] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[4] Erik Nordmark,et al. Securing MIPv6 BUs using return routability (BU3WAY) , 2001 .
[5] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] A. Jøsang. TRUST-BASED DECISION MAKING FOR ELECTRONIC TRANSACTIONS , 1999 .
[7] Frank Stajano,et al. The Resurrecting Duckling - What Next? , 2000, Security Protocols Workshop.
[8] Michael Roe,et al. Authentication of Mobile IPv6 Binding Updates and Acknowledgments , 2002 .
[9] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[10] Chris J. Mitchell,et al. The personal CA – PKI for a Personal Area Network , 2003 .
[11] Michael Roe,et al. Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.
[12] Pekka Nikander,et al. Securing IPv6 neighbor and router discovery , 2002, WiSE '02.
[13] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[14] Pekka Nikander. Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World , 2001, Security Protocols Workshop.