Mitchell, Chris J (1997) Authentication using cryptography. Information Security Technical Report, 2 (2).
Full text access: Open
This is a Submitted version This version's date is: 1997 This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/ffaab654-56aa-5680-d988-a9f382110f35/2/
Deposited by Research Information System (atira) on 24-Jul-2012 in Royal Holloway Research Online.Last modified on 24-Jul-2012