Performance Analysis of Secured Privacy and Key Management Protocol in IEEE 802-16e-2005.
Ayesha AltafM. Younus JavedSheraz NaseerAisha LatifPublished in: J. Digit. Content Technol. its Appl. (2009)
Keyphrases
- key management
- security services
- key distribution
- security protocols
- provably secure
- trusted third party
- authentication protocol
- digital signature
- group communication
- security properties
- elliptic curve
- ad hoc networks
- wireless sensor networks
- key management scheme
- resource constrained
- secret key
- key establishment
- cryptographic protocols
- secure communication
- diffie hellman
- privacy preserving
- information security
- personal information
- security mechanisms
- security issues
- security threats
- public key
- privacy protection
- blind signature
- lightweight
- identity based cryptography
- privacy preserving data mining
- private information
- wireless ad hoc networks
- security requirements
- multi party
- mobile devices
- personal data
- rfid tags
- resource constraints
- sensitive information
- real time