Cryptographically secure identity certificates.
Darko KirovskiNebojsa JojicPublished in: ICASSP (5) (2004)
Keyphrases
- identity management
- access control
- public key infrastructure
- public key
- trust relationships
- security mechanisms
- security requirements
- diffie hellman
- security analysis
- cloud computing
- security policies
- security issues
- user centric
- digital signature
- low cost
- personal information
- trusted third party
- user privacy
- authentication scheme
- security protocols
- key management
- encryption scheme
- security model
- authentication protocol
- rfid tags