Extending a Secure Autonomous Bootstrap Mechanism to Multicast Security.
Nobuo OkabeShoichi SakaneKazunori MiyazawaKenichi KamadaPublished in: SAINT Workshops (2007)
Keyphrases
- authentication mechanism
- key management scheme
- security issues
- key management
- security requirements
- mobile agent system
- security measures
- security mechanisms
- security level
- access control mechanism
- data encryption
- security protocols
- security management
- security properties
- information security
- security services
- cryptographic protocols
- authentication protocol
- security model
- data security
- security analysis
- electronic voting
- encryption scheme
- security patterns
- inter domain
- stream cipher
- sensitive data
- security architecture
- network security
- key exchange protocol
- trusted computing
- digital signature scheme
- user authentication
- intrusion detection
- wireless networks
- identity management
- resource constrained
- access control
- security policies
- key exchange
- key establishment
- integrity verification
- key distribution
- ad hoc networks
- diffie hellman
- key agreement
- digital rights management
- private key
- routing algorithm
- public key encryption
- ip multicast
- authentication scheme
- previously mentioned
- secure communication
- group communication
- rfid systems
- wireless sensor networks
- mobile ad hoc networks
- intrusion detection system
- peer to peer