Phil Janson

Learn More
In this paper, a number of mechanisms are described that can be used in the design of a protocol convertor for authentication and key distribution protocols. First, the scope of the mechanisms is deened: we mark out the class of authentication systems that were considered during the design of the mechanisms. A rst mechanism, based on proxies and a(More)
  • 1