Open dbosk opened 7 years ago
The area of authentication that we are interested in can be divided into these categories:
User--machine and machine--user authentication are discussed in overview. The machine-to-machine authentication is basically the main topic of fverifprotocols, that should move here.
Machine-to-machine might also be covered by keyauth.
keyauth
These are usually chained when using crypto and involving hardware.
User-to-user (through-machine) will probably require distance bounding in some cases.
The area of authentication that we are interested in can be divided into these categories: