Secure and Authenticated Access to LLN Resources Through Policy Constraints.
Konstantinos RantosKonstantinos FysarakisOthonas SultatosIoannis G. AskoxylakisPublished in: WISTP (2015)
Keyphrases
- key exchange protocol
- password authentication
- resource constraints
- key exchange
- authentication scheme
- digital resources
- uniform access
- key agreement protocol
- limited resources
- secure manner
- key distribution
- resource allocation
- access control
- cache management
- security requirements
- resource management
- user authentication
- remote access
- information providers