A security protocol for D2D communications in 5G networks using elliptic curve cryptography.
R. KishoreIacovos IoannouChristophoros ChristophorouN. PrabagaraneVasos VassiliouS. VigneshH. VinayakS. VenkateshAndreas PitsillidesPublished in: Int. J. Inf. Sec. (2022)
Keyphrases
- cryptographic algorithms
- security protocols
- elliptic curve cryptography
- elliptic curve
- security analysis
- public key
- security services
- public key cryptography
- key management
- authentication scheme
- authentication protocol
- security requirements
- error correction
- security mechanisms
- communication systems
- ad hoc networks
- rfid tags