Device Token Protocol for Persistent Authentication Shared across Applications.
John TrammelÜmit YalçinalpAndrei KalfasJames BoagDan BrotskyPublished in: ESOCC (2012)
Keyphrases
- virtual private network
- authentication protocol
- key distribution
- security analysis
- mutual authentication
- trusted third party
- rfid tags
- ban logic
- remote server
- key agreement protocol
- lightweight
- smart card
- password authentication
- authentication scheme
- group communication
- cryptographic protocols
- network management
- session key
- public key
- privacy protection
- biometric authentication
- secure communication
- user authentication
- communication protocol
- security protocols
- wireless local area network
- security properties
- rfid systems
- security services
- elliptic curve
- fragile watermarking