Empowering Security and Mobility in Future Networks with an Identity-Based Control Plane.
Pedro Martinez-JuliaAntonio F. SkarmetaPublished in: IEICE Trans. Commun. (2014)
Keyphrases
- key management
- signcryption scheme
- encryption scheme
- control system
- ns simulator
- information security
- enterprise network
- network security
- identity based cryptography
- network connectivity
- security requirements
- control strategy
- ad hoc networks
- human operators
- network management
- key distribution
- complex networks
- intrusion detection
- social networks