Phil Janson

Learn More
The extensive use of open networks and distributed systems poses serious threats to the security of end-to-end communications and network components themselves. A necessary foundation for securing a network is the ability to reliably authenticate communication partners and other network entities. ne-way, password-based authentication techniques are not(More)
In this paper, a number of mechanisms are described that can be used in the design of a protocol convertor for authentication and key distribution protocols. First, the scope of the mechanisms is deened: we mark out the class of authentication systems that were considered during the design of the mechanisms. A rst mechanism, based on proxies and a(More)
  • 1