Secure Content Distribution Using Multi-hop Proxy Re-encryption.
Han-Yu LinPublished in: Wirel. Pers. Commun. (2015)
Keyphrases
- multi hop
- public key encryption
- proxy re encryption
- standard model
- wireless sensor networks
- ad hoc networks
- mobile ad hoc networks
- wireless networks
- security model
- end to end
- routing protocol
- base station
- energy efficient
- keyword search
- energy consumption
- real time
- data transmission
- security requirements
- public key
- encryption scheme
- sensor networks
- routing algorithm
- network topology
- key management
- metadata
- ciphertext
- key distribution
- wifi
- databases
- relational databases
- security analysis
- user experience
- cost effective
- multimedia data