A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Robust decentralized authentication for public keys and geographic location
2009
Authentication has traditionally been done either in a decentralized manner with human assistance or automatically through a centralized security infrastructure. In the security infrastructure approach, a central trusted authority takes on the responsibility of authenticating participants within its domain of control. While the security infrastructure approach works well in traditional organizations, it does not address the needs of open membership systems. We propose automatic decentralized
doi:10.7282/t3g1613t
fatcat:vf5czvah7ncb3flkpszvpwrvsq