aaa-5----Page:2
1  2  3  4  5 

Introduction
Some people are concerned that a working group outside of the Security Area is designing a key management protocols.
Why?
Key management protocols are subtle.
An expert can easily miss a flaw.
Peer review by multiple experts is essential.
PPT Version