Guidance for Authentication, Authorization, and Accounting (AAA) Key Management.
Russ HousleyBernard AbobaPublished in: RFC (2007)
Keyphrases
- key management
- key distribution
- identity based cryptography
- security services
- secure communication
- access control
- security requirements
- authentication scheme
- ad hoc networks
- resource constrained
- wireless sensor networks
- key management scheme
- trust negotiation
- encryption decryption
- group communication
- security mechanisms
- secret key
- security protocols
- provably secure
- secret sharing scheme
- elliptic curve
- smart card
- digital signature
- security analysis
- public key cryptography
- private key
- authentication protocol
- security policies
- pairwise
- conflict resolution
- resource constraints
- sensor networks
- wireless networks
- routing protocol
- information security
- multipath