[Download postscript version]
next up previous
Next: Validation of root keys Up: Hash Visualization: a New Previous: Random Art: A Prototype

Application

 

In this section, we show how to use hash visualization to improve the real-world security of root key validation and user authentication.




next up previous
Next: Validation of root keys Up: Hash Visualization: a New Previous: Random Art: A Prototype

Adrian Perrig
Wed Sep 15 15:31:30 PDT 1999