Login / Signup
HMAC-SHA-2 Authentication Protocols in User-Based Security Model (USM) for SNMPv3.
Johannes Merkle
Manfred Lochter
Published in:
RFC (2016)
Keyphrases
</>
security model
security analysis
public key
authentication protocol
security requirements
access control
smart card
digital signature
real time
low cost
e government
fine grained
information sharing
hash functions
rfid tags