Securing Address Registration in Location/ID Split Protocol Using ID-Based Cryptography.
Mahdi AiashAmeer Al-NemratDavid S. PrestonPublished in: WWIC (2013)
Keyphrases
- key distribution
- information security
- image registration
- cryptographic protocols
- cryptographic algorithms
- blind signature
- provably secure
- key management
- standard model
- diffie hellman
- registration process
- security model
- blind signature scheme
- authentication protocol
- elliptic curve
- public key
- point cloud
- cellular automata