Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server.
Mingwu ZhangYan JiangYi MuWilly SusiloPublished in: IEEE Access (2017)
Keyphrases
- multi hop
- encryption algorithm
- encrypted data
- wireless sensor networks
- mobile ad hoc networks
- wireless networks
- ad hoc networks
- data encryption
- data transmission
- security analysis
- third party
- base station
- pseudorandom
- routing protocol
- energy efficient
- end to end
- service providers
- encryption scheme
- energy consumption
- routing algorithm
- information systems
- wifi
- sensitive data
- digital content
- communication networks
- computer simulation
- cloud computing
- wavelet transform
- web services