On 09-12-10 11:51 AM, Tschofenig, Hannes (NSN - FI/Espoo) wrote: > Then, they go to the ITU-T to do the analysis work. Why? Maybe they > think that a standard in the area of strong password based > authentication in the ITU-T would lead to some deployment or so. Hard to > guess the real reason.
Who are the expected consumers of the document? Anyone can read the ITU document, but who will be paying attention to it, and following its recommendations? Alan DeKok. _______________________________________________ Emu mailing list [email protected] https://www.ietf.org/mailman/listinfo/emu
