Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI.
Yossi GiladAmir HerzbergPublished in: ESORICS (2013)
Keyphrases
- public key infrastructure
- security mechanisms
- security policies
- security services
- digital signature
- public key cryptography
- public key
- security requirements
- access control
- payment systems
- ring signature scheme
- security properties
- security problems
- security issues
- information exchange
- key technologies
- information security
- application development
- network security
- resource constrained
- digital copyright protection
- rfid systems
- virtual private network
- smart card
- operating system
- intrusion detection
- trust relationships
- trusted third party
- network layer
- security protocols