Abstract
In the article by T.Y.C. Woo and S.S. Lam (see ibid., vol.25, no.1, p.39-52, 1992), the peer-peer authentication protocol needs augmentation, this augmentation is presented and discussed briefly.

This publication has 1 reference indexed in Scilit: