XML-based security for JXTA core protocols.
Joan Arnedo-MorenoJordi Herrera-JoancomartíPublished in: Int. J. Auton. Comput. (2010)
Keyphrases
- security protocols
- key agreement protocol
- cryptographic protocols
- communication protocols
- security properties
- security services
- access control
- information security
- authentication protocol
- secure multiparty computation
- key establishment
- statistical databases
- security analysis
- key exchange
- key distribution
- network security
- security requirements
- security level
- security issues
- messages exchanged
- trusted third party
- intrusion detection
- key management
- network management
- application level
- sensor networks
- group communication
- web services
- security policies
- computer security
- metadata
- mutual authentication
- electronic voting
- information systems