Identity based security for authentication and mobility in future ID oriented networks.
Rongfei WanBin DaRichard LiChuang WangHongpei LiPublished in: ICOIN (2018)
Keyphrases
- key distribution
- identity based cryptography
- key management
- authentication and key agreement
- security requirements
- security mechanisms
- security analysis
- authentication protocol
- encryption scheme
- identity authentication
- authentication mechanism
- fuzzy vault
- public key cryptography
- signcryption scheme
- security services
- user authentication
- encryption decryption
- ns simulator
- integrity verification
- authentication scheme
- smart card
- information security
- data encryption
- digital signature
- intrusion detection
- biometric data
- provably secure
- authentication systems
- private key
- ad hoc networks
- factor authentication
- security policies
- security problems
- biometric authentication
- standard model
- signature scheme
- public key infrastructure
- key agreement protocol
- social networks
- mobile networks
- electronic payment
- resource constrained
- mobile agents
- security protocols
- identity management
- secret key
- key agreement
- security systems
- access control
- virtual private network
- secret sharing scheme
- security model
- network security
- public key cryptosystem
- elliptic curve
- biometric systems
- public key
- heterogeneous networks