Efficient Identity-Based Key Management for Configurable Hierarchical Cloud Computing Environment.
Jyun-Yao HuangI-En LiaoCheng-Kang ChiangPublished in: ICPADS (2011)
Keyphrases
- key management
- provably secure
- cloud computing environment
- ad hoc networks
- resource constrained
- wireless sensor networks
- key distribution
- identity based cryptography
- key management scheme
- cloud computing
- digital signature
- secret key
- elliptic curve
- security services
- database
- diffie hellman
- security protocols
- routing protocol
- secure communication
- signcryption scheme
- load balancing
- databases