Authentication

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In contrast to the legacy Internet, SCION was designed and built with security as one of the primary objectives. Therefore, all control-plane messages are authenticated. The verification of those messages relies on a public-key infrastructure (PKI) called the control-plane PKI or CP-PKI. In short, the CPPKI is a set of mechanisms, roles, and policies related to the management and usage of certificates, which enable the verification of signatures, e.g., on path segment construction beacons (PCBs).

Cite

CITATION STYLE

APA

Chuat, L., Legner, M., Basin, D., Hausheer, D., Hitz, S., Müller, P., & Perrig, A. (2022). Authentication. In Information Security and Cryptography (pp. 35–63). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-05288-0_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free