Advertisement

Panel: Authentication in Constrained Environments

  • Mike Burmester
  • Virgil Gligor
  • Evangelos Kranakis
  • Doug Tygar
  • Yuliang Zheng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4074)

Abstract

This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-written notes.

Keywords

Cell Phone Block Cipher Authentication Protocol Random Polynomial Merkle Tree 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Mike Burmester
    • 1
  • Virgil Gligor
    • 2
  • Evangelos Kranakis
    • 3
  • Doug Tygar
    • 4
  • Yuliang Zheng
    • 5
  1. 1.Dept. of Computer ScienceFlorida State UniversityTallahassee
  2. 2.Dept. of Electrical and Computer EngineeringUniversity of MarylandCollege Park
  3. 3.Sch. of Computer ScienceCarleton UniversityCanada
  4. 4.Dept. of Electrical Engineering and Computer ScienceUniversity of CaliforniaBerkeley
  5. 5.Dept. of Software and Information SystemsUniversity of North CarolinaCharlotte

Personalised recommendations