On 09-12-10 11:51 AM, Tschofenig, Hannes (NSN - FI/Espoo) wrote:
> Then, they go to the ITU-T to do the analysis work. Why? Maybe they
> think that a standard in the area of strong password based
> authentication in the ITU-T would lead to some deployment or so. Hard to
> guess the real reason.

  Who are the expected consumers of the document?

  Anyone can read the ITU document, but who will be paying attention to
it, and following its recommendations?

  Alan DeKok.
_______________________________________________
Emu mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/emu

Reply via email to