This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Authentication Revisited
March 1992 (vol. 25 no. 3)
pp. 10

In the article by T.Y.C. Woo and S.S. Lam (see ibid., vol.25, no.1, p.39-52, 1992), the peer-peer authentication protocol needs augmentation, this augmentation is presented and discussed briefly.

Citation:
T.Y.C. Woo, S.S. Lam, "Authentication Revisited," Computer, vol. 25, no. 3, pp. 10, March 1992, doi:10.1109/2.121502
Usage of this product signifies your acceptance of the Terms of Use.