Building identity-based security associations for provider-provisioned virtual private networks.
Khaled MasmoudiHossam AfifiPublished in: Telecommun. Syst. (2008)
Keyphrases
- key management
- signcryption scheme
- encryption scheme
- authentication and key agreement
- access control
- internet service providers
- privacy preserving
- identity based cryptography
- virtual environment
- virtual world
- standard model
- enterprise network
- provably secure
- intrusion detection
- security issues
- information security
- security problems
- security policies
- network security
- computer networks
- homomorphic encryption
- public key cryptosystem
- association rules
- signature scheme
- security services
- data sharing