Keyphrases
- trust negotiation
- authentication protocol
- security requirements
- security analysis
- access control
- key distribution
- smart card
- security mechanisms
- mutual authentication
- security properties
- fine grained
- distributed systems
- ban logic
- lightweight
- key agreement protocol
- security model
- user authentication
- key agreement
- automated trust negotiation
- multi agent
- trusted third party
- password authentication
- cooperative
- security protocols
- peer to peer
- security services
- conflict resolution
- biometric authentication
- intrusion detection
- virtual private network
- security policies
- trust relationships
- authentication scheme
- resource constrained
- trust management
- wireless local area network
- key exchange protocol
- access requests
- negotiation protocol
- secure communication
- identity management