Login / Signup
Securing Mobile Phone Calls with Identity-Based Cryptography.
Matthew Smith
Christian Schridde
Björn Agel
Bernd Freisleben
Published in:
ISA (2009)
Keyphrases
</>
mobile phone
identity based cryptography
key management
mobile devices
mobile users
digital signature
mobile technologies
bilinear pairings
information security
wireless sensor networks
ad hoc networks
resource constrained
mobile phone users
cloud computing