Authentication on Untrusted Remote Hosts with Public-Key Sudo.
Matthew BurnsideMack LuAngelos D. KeromytisPublished in: LISA (2008)
Keyphrases
- public key
- image authentication
- public key cryptography
- security analysis
- authentication protocol
- message authentication codes
- private key
- authentication scheme
- elliptic curve cryptography
- session key
- public key infrastructure
- security model
- digital signature
- signature scheme
- secure communication
- public key cryptosystem
- diffie hellman
- secret key
- third party
- public key encryption
- mobile agents
- user authentication
- key distribution
- real time
- ciphertext
- encryption scheme
- proxy re encryption
- security policies
- error correction
- partially blind signature scheme
- network traffic