Journal article icon

Journal article

Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey

Abstract:

One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public Key Infrastructure. An approach studied by a number of researchers is building security though human work creating a low-bandwidth empirical (or authentication) channel where the transmitted information is authentic and cannot be faked or modified. In this paper, we give an analytical survey of authentication protocol...

Expand abstract

Actions


Access Document


Publisher copy:
10.3233/JCS-2010-0403

Authors


Nguyen, LH More by this author
Roscoe, AW More by this author
Journal:
Journal of Computer Security
Volume:
19
Issue:
1
Pages:
139-201
Publication date:
2011
DOI:
ISSN:
0926-227X
URN:
uuid:86e12f3f-84be-49c8-88af-f07b9b146d63
Source identifiers:
302747
Local pid:
pubs:302747

Terms of use


Metrics



If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP