Next: Authenticated Routing
Up: SPINS: Security Protocols for
Previous: Evaluation
In this section we demonstrate how we can build secure protocols out of the
SPINSsecure building blocks. First, we build an authenticated routing
application, and second, a two-party key agreement protocol.
Next: Authenticated Routing
Up: SPINS: Security Protocols for
Previous: Evaluation
Adrian Perrig
Fri Jun 1 22:51:44 PDT 2001