Mitchell, Chris J (1997) Authentication using cryptography. Information Security Technical Report, 2 (2).
Full text access: Open
This is a Submitted version This version's date is: 1997 This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/ffaab654-56aa-5680-d988-a9f382110f35/7/
Deposited by Research Information System (atira) on 22-Jul-2014 in Royal Holloway Research Online.Last modified on 22-Jul-2014