Using the NETCONF Configuration Protocol over Secure SHell (SSH).
Margaret WassermanTed GoddardPublished in: RFC (2006)
Keyphrases
- cryptographic protocols
- covert channel
- authentication protocol
- secure routing
- security protocols
- scalar product
- key distribution
- group communication
- security analysis
- lightweight
- homomorphic encryption
- provably secure
- diffie hellman
- vertically partitioned data
- key exchange protocol
- key agreement protocol
- secure multiparty computation
- cryptographic algorithms
- rfid systems
- multi party
- security model
- secure multi party
- privacy preserving
- electronic voting
- security services
- security requirements
- formal analysis
- security properties
- public key
- key exchange
- trusted third party
- mutual authentication
- key management
- authentication scheme
- encryption scheme
- key establishment
- session key
- secure communication
- communication protocol
- blind signature
- user privacy
- mobile agent system
- user authentication
- private key
- database systems
- security issues
- ad hoc networks
- password authentication
- digital signature scheme