Secure roaming with identity metasystems.
Long Nguyen HoangPekka LaitinenN. AsokanPublished in: IDtrust (2008)
Keyphrases
- identity management
- trust relationships
- access control
- neural network
- security requirements
- databases
- key exchange
- authentication scheme
- security level
- digital signature
- standard model
- user centric
- security issues
- personal information
- lightweight
- multi party
- key management
- key distribution
- intrusion detection
- mobile phone
- real time
- stream cipher
- scalar product