Secure Key Management in the Cloud.
Ivan DamgårdThomas P. JakobsenJesper Buus NielsenJakob Illeborg PagterPublished in: IMACC (2013)
Keyphrases
- key management
- key management scheme
- key distribution
- wireless sensor networks
- ad hoc networks
- resource constrained
- cloud computing
- digital signature
- security threats
- group communication
- secret sharing scheme
- provably secure
- secure communication
- security services
- identity based cryptography
- elliptic curve
- security protocols
- secret key
- diffie hellman
- key establishment
- data center
- routing protocol
- private key
- routing algorithm
- similarity measure
- real time
- response time
- bilinear pairings