Login / Signup
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks.
Shushan Zhao
Akshai K. Aggarwal
Richard A. Frost
Xiaole Bai
Published in:
IEEE Commun. Surv. Tutorials (2012)
Keyphrases
</>
identity based cryptography
key management
ad hoc networks
mobile ad hoc networks
bilinear pairings
digital signature
data streams
digital libraries
database
digital images
resource constrained
signcryption scheme