Issue No. 03 - March (1992 vol. 25)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/2.121502
<p>In the article by T.Y.C. Woo and S.S. Lam (see ibid., vol.25, no.1, p.39-52, 1992), the peer-peer authentication protocol needs augmentation, this augmentation is presented and discussed briefly.</p>
S. Lam and T. Woo, "Authentication Revisited," in Computer, vol. 25, no. , pp. 10, 1992.