Security Improvement of Portable Key Management Using a Mobile Phone.
Jiye KimDonghoon LeeYounsung ChoiYoungsook LeeDongho WonPublished in: ICCSA (4) (2015)
Keyphrases
- key management
- mobile phone
- security threats
- resource constrained
- wireless sensor networks
- identity based cryptography
- key management scheme
- ad hoc networks
- key distribution
- mobile devices
- security protocols
- security services
- digital signature
- mobile users
- mobile phone users
- elliptic curve
- key establishment
- secret key
- mobile applications
- provably secure
- diffie hellman
- security mechanisms
- secure communication
- low cost
- lightweight
- network security
- routing protocol