Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections.
Rene MayrhoferRoswitha GostnerPublished in: J. Mobile Multimedia (2007)
Keyphrases
- spatial context
- trusted third party
- user authentication
- authentication mechanism
- authentication scheme
- password authentication
- data encryption
- spatial and temporal
- security mechanisms
- authentication protocol
- identity management
- factor authentication
- integrity verification
- wireless local area network
- contextual information
- temporal context
- security analysis
- security requirements
- wireless networks
- secure manner
- security services
- public key cryptography
- rights management
- key distribution
- spatial information
- image regions
- smart card
- mobile devices
- digital signature
- spatial relationships
- access control
- public key
- secure communication
- proxy re encryption
- standard model
- security issues
- security properties
- secret key
- bilinear pairings
- resource constrained
- key management
- security protocols
- space time
- context aware
- private key
- low level