End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace.
Tobias HeerRené HummenMiika KomuStefan GötzKlaus WehrlePublished in: ICC (2009)
Keyphrases
- security requirements
- smart card
- encryption decryption
- access control
- public key cryptography
- security properties
- elliptic curve cryptography
- security mechanisms
- authentication protocol
- trust negotiation
- biometric authentication
- authentication scheme
- security analysis
- secure communication
- fuzzy vault
- security protocols
- key management
- digital images
- identity management
- security services
- conflict resolution
- hash functions
- fine grained