On the Security of Tag-KEM for Signcryption.
Maki YoshidaToru FujiwaraPublished in: Electron. Notes Theor. Comput. Sci. (2007)
Keyphrases
- key management
- security properties
- signcryption scheme
- rfid systems
- intrusion detection
- standard model
- security requirements
- key management scheme
- trusted third party
- rfid tags
- access control
- security issues
- network security
- radio frequency identification rfid
- security model
- information security
- security analysis
- bilinear pairings
- security problems
- provably secure
- encryption scheme
- formal model
- wireless sensor networks
- keywords
- elliptic curve
- information systems
- resource constrained
- security services
- secret key
- security policies
- ad hoc networks