Secure System Communication to Emergencies for Victims Management Through Identity Based Signcryption Scheme.
Alexandra Rivero-GarcíaCandelaria Hernández-GoyaIván Santos-GonzálezPino Caballero-GilPublished in: UCAmI (2017)
Keyphrases
- signcryption scheme
- standard model
- key management
- key distribution
- group communication
- resource constrained
- private key
- bilinear pairings
- secure communication
- encryption scheme
- public key
- diffie hellman
- designated verifier
- identity based cryptography
- provably secure
- security analysis
- secret key
- cryptographic protocols
- wireless sensor networks
- fault tolerant
- authentication protocol
- digital signature
- signature scheme
- information sharing
- security services
- elliptic curve
- multi party
- data management
- wireless ad hoc networks
- end to end
- forward secure
- sensor networks