Login / Signup

Demo overview: fully decentralised authentication scheme for ICN in disaster scenarios.

Jan SeedorfBilal GillDirk KutscherBenjamin SchillerDirk Kohlweyer
Published in: ICN (2014)
Keyphrases
  • authentication scheme
  • smart card
  • secret key
  • user authentication
  • image encryption
  • security flaws
  • public key
  • authentication protocol
  • image authentication
  • conflict resolution
  • key management
  • security analysis