DanC: hmm... phb writes "Traditionally, mobile devices have been authenticated by symmetric key techniques ..." huh? aren't SIM cards the world's best example of public key deployment?
mhausenblas: comments welcome as usual ... please feedback on the technical level (philosophy is nice as well, but concrete technical proposals help more in the current situation)