Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties

This paper discusses “weak authentication” techniques to provide cryptographically strong authentication between previously unknown parties without relying on trusted third parties.

[1]  Dieter Gollmann,et al.  Computer Security — ESORICS 94 , 1994, Lecture Notes in Computer Science.

[2]  Frank Stajano,et al.  The Resurrecting Duckling , 1999 .

[3]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[4]  Erik Nordmark,et al.  Securing MIPv6 BUs using return routability (BU3WAY) , 2001 .

[5]  Thomas Beth,et al.  Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[6]  A. Jøsang TRUST-BASED DECISION MAKING FOR ELECTRONIC TRANSACTIONS , 1999 .

[7]  Frank Stajano,et al.  The Resurrecting Duckling - What Next? , 2000, Security Protocols Workshop.

[8]  Michael Roe,et al.  Authentication of Mobile IPv6 Binding Updates and Acknowledgments , 2002 .

[9]  Ross J. Anderson Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.

[10]  Chris J. Mitchell,et al.  The personal CA – PKI for a Personal Area Network , 2003 .

[11]  Michael Roe,et al.  Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.

[12]  Pekka Nikander,et al.  Securing IPv6 neighbor and router discovery , 2002, WiSE '02.

[13]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[14]  Pekka Nikander Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World , 2001, Security Protocols Workshop.