next up previous
Next: Authenticated Routing Up: SPINS: Security Protocols for Previous: Evaluation

Full paper: Postscript, PS.GZ, PDF


Applications

 

In this section we demonstrate how we can build secure protocols out of the SPINSsecure building blocks. First, we build an authenticated routing application, and second, a two-party key agreement protocol.




next up previous
Next: Authenticated Routing Up: SPINS: Security Protocols for Previous: Evaluation

Adrian Perrig
Fri Jun 1 22:51:44 PDT 2001