[Download postscript version]
Next: Validation of root keys
Up: Hash Visualization: a New
Previous: Random Art: A Prototype
In this section, we show how to use hash visualization to improve the real-world
security of root key validation and user authentication.
Next: Validation of root keys
Up: Hash Visualization: a New
Previous: Random Art: A Prototype
Adrian Perrig
Wed Sep 15 15:31:30 PDT 1999