Authentication and Confidentiality via IPSEC.
Joshua D. GuttmanAmy L. HerzogF. Javier ThayerPublished in: ESORICS (2000)
Keyphrases
- authentication protocol
- security analysis
- access control
- key exchange
- smart card
- public key
- user authentication
- identity authentication
- security properties
- fragile watermarking
- biometric authentication
- security mechanisms
- information security
- key distribution
- authentication scheme
- image authentication
- semi fragile watermarking
- identity management
- security protocols
- security requirements
- lightweight