Implementing New-age Authentication Techniques using OpenID for Security Automation
Dharmendra ChoukseUmesh Kumar SinghDeepak SukhejaRekha ShahapurkarPublished in: CoRR (2010)
Keyphrases
- authentication mechanism
- data encryption
- security services
- identity authentication
- security mechanisms
- security analysis
- user authentication
- security requirements
- fuzzy vault
- mutual authentication
- authentication protocol
- factor authentication
- key agreement protocol
- authentication scheme
- integrity verification
- authentication systems
- identity management
- secret sharing scheme
- security protocols
- key management
- information security
- trusted platform module
- identity based cryptography
- public key infrastructure
- encryption algorithm
- security policies