Hi Bernard,
here is my guess of the background of all this work.
Imagine a company has worked on strong password based authentication and
key exchange protocols. That company might also believe that they have
some IPRs in this field.
Now, some folks in that company would like to get their
On 09-12-10 11:51 AM, Tschofenig, Hannes (NSN - FI/Espoo) wrote:
Then, they go to the ITU-T to do the analysis work. Why? Maybe they
think that a standard in the area of strong password based
authentication in the ITU-T would lead to some deployment or so. Hard to
guess the real reason.
Who