Keyphrases
- transport layer
- authentication mechanism
- user authentication
- information security
- security issues
- password authentication
- network layer
- password based authenticated key exchange
- security requirements
- physical layer
- end to end
- data encryption
- security mechanisms
- key management
- key exchange protocol
- application layer
- graphical password
- authentication protocol
- smart card
- security analysis
- security protocols
- intrusion detection
- access control
- key agreement protocol
- encryption scheme
- network monitoring
- smart grid
- diffie hellman
- network management
- security policies
- network security
- computer networks