Panel: Authentication in Constrained Environments
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4074)
This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-written notes.
KeywordsCell Phone Block Cipher Authentication Protocol Random Polynomial Merkle Tree
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
© Springer-Verlag Berlin Heidelberg 2006