On the Security of Certificateless Authenticated Key Agreement Protocol (CL-AK) for Grid Computing.
Mengbo HouQiuliang XuPublished in: ChinaGrid (2009)
Keyphrases
- key agreement protocol
- grid computing
- provably secure
- authenticated key agreement
- diffie hellman
- signature scheme
- key management
- distributed computing
- standard model
- load balancing
- security model
- peer to peer
- resource management
- resource sharing
- bilinear pairings
- public key cryptography
- public key
- computing environments
- hash functions
- key distribution
- wireless sensor networks
- encryption scheme
- key exchange
- private key
- elliptic curve
- management system