Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks.
Tzong-Sun WuChien-Lung HsuPublished in: Comput. Secur. (2004)
Keyphrases
- computer networks
- key distribution
- key management
- network security
- fault tolerant
- data transmission
- group communication
- computer systems
- provably secure
- intrusion detection system
- network traffic
- key management scheme
- distributed systems
- elliptic curve
- secret key
- communication networks
- cost effective
- authentication protocol
- intrusion detection
- lightweight
- anomaly detection
- trusted third party
- signcryption scheme
- peer to peer