An end-to-end exponentially secure secrecy scheme against an unbounded adversary.
Yahya S. KhiabaniShuangqing WeiPublished in: CISS (2013)
Keyphrases
- end to end
- key distribution
- key management
- wireless ad hoc networks
- security analysis
- ad hoc networks
- authentication scheme
- mutual authentication
- packet loss rate
- admission control
- diffie hellman
- security properties
- public key
- congestion control
- authentication protocol
- elliptic curve
- application layer
- rate allocation
- secret key
- private key
- differentiated services
- signature scheme
- multipath
- multiple description coding
- transport layer