Panel: Authentication in Constrained Environments
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4074)
This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-written notes.
KeywordsCell Phone Block Cipher Authentication Protocol Random Polynomial Merkle Tree
Unable to display preview. Download preview PDF.
© Springer-Verlag Berlin Heidelberg 2006