OSPFv2 HMAC-SHA Cryptographic Authentication.
Manav BhatiaVishwas ManralMatthew J. FantoRuss WhiteM. BarnesTony LiRandall J. AtkinsonPublished in: RFC (2009)
Keyphrases
- hash functions
- authentication protocol
- public key cryptography
- smart card
- elliptic curve cryptography
- encryption decryption
- fuzzy vault
- authentication scheme
- secret key
- secure communication
- key management
- key distribution
- fragile watermarking
- public key
- security analysis
- user authentication
- identity authentication
- similarity search
- security requirements
- biometric authentication
- elliptic curve
- digital signature
- image authentication
- identity management
- security services
- security mechanisms
- random number generator
- public key encryption
- image encryption
- data security
- encryption scheme
- authentication mechanism
- ad hoc networks
- neural network