Mitchell, Chris J (1997) Authentication using cryptography. Information Security Technical Report, 2 (2).
Full text access: Open
This is a Submitted version This version's date is: 1997 This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/ffaab654-56aa-5680-d988-a9f382110f35/8/
Deposited by Research Information System (atira) on 18-Nov-2014 in Royal Holloway Research Online.Last modified on 18-Nov-2014