Login / Signup

HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3.

Johannes MerkleManfred Lochter
Published in: RFC (2015)
Keyphrases
  • security model
  • security analysis
  • public key
  • authentication protocol
  • smart card
  • security requirements
  • access control
  • hash functions
  • digital signature
  • database systems
  • lightweight