Login / Signup
HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3.
Johannes Merkle
Manfred Lochter
Published in:
RFC (2015)
Keyphrases
</>
security model
security analysis
public key
authentication protocol
smart card
security requirements
access control
hash functions
digital signature
database systems
lightweight