Login / Signup
Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties.
Jari Arkko
Pekka Nikander
Published in:
Security Protocols Workshop (2002)
Keyphrases
</>
user authentication
trust relationships
fair exchange protocols
privacy preserving
authentication scheme
distributed environment
private data
data encryption
neural network
multi agent systems
trusted computing
identity authentication
network connection
fragile watermarking