Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of Things.
Jay DaveNikumani ChoudhuryUtkarsh TiwariSamyu KamtamKudapa Sai RohithPublished in: COMPSAC (2023)
Keyphrases
- key management
- key distribution
- wireless sensor networks
- resource constrained
- key management scheme
- ad hoc networks
- digital signature
- provably secure
- secure communication
- secret sharing scheme
- security services
- secret key
- security threats
- security protocols
- diffie hellman
- identity based cryptography
- group communication
- elliptic curve
- key technologies
- authentication scheme
- mobile devices
- key establishment
- private key
- smart card
- real time