Login / Signup
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems.
Attila Altay Yavuz
Peng Ning
Michael K. Reiter
Published in:
ACM Trans. Inf. Syst. Secur. (2012)
Keyphrases
</>
resource constrained
key management
provably secure
security mechanisms
resource constraints
wireless sensor networks
cost effective
lightweight
sensor networks
protection schemes
genetic algorithm
smart card
security requirements
secret sharing
cryptographic protocols
secure communication
resource limitations