A Secure Cloud-Based IDPS Using Cryptographic Traces and Revocation Protocol.
Hind IdrissiMohammed EnnahbaouiSaid El HajjiEl Mamoun SouidiPublished in: C2SI (2017)
Keyphrases
- cryptographic protocols
- key management
- key distribution
- security protocols
- public key cryptography
- provably secure
- homomorphic encryption
- group communication
- digital signature
- security properties
- blind signature
- authentication protocol
- trusted third party
- public key
- smart card
- security requirements
- covert channel
- secure communication
- security model
- security services
- elliptic curve
- cryptographic algorithms
- privacy preserving
- key establishment
- access control
- resource constrained
- wireless sensor networks
- ad hoc networks
- security mechanisms
- diffie hellman
- standard model
- cloud computing
- electronic voting
- encryption scheme
- password authentication
- secret key
- key agreement protocol
- lightweight
- public key infrastructure
- key exchange protocol
- encryption key
- fault tolerant
- data sharing
- key exchange
- public key encryption