Trusted Security Devices for Bandwidth Conservation in IPSec Environments.
Chad D. ManoAaron StriegelPublished in: NETWORKING (2005)
Keyphrases
- network connection
- network security
- trusted computing
- key exchange
- ubiquitous computing environments
- information security
- authentication protocol
- computing environments
- access control
- intelligent environments
- security issues
- physical world
- everyday objects
- intrusion detection
- security policies
- security mechanisms
- wireless sensor
- mobile devices
- statistical databases
- network bandwidth
- security analysis
- security requirements
- embedded systems
- smart card
- security properties
- mobile agent system
- intrusion detection system
- key management
- human operators