Keyphrases
- key management scheme
- key management
- identity based signature
- bilinear pairings
- identity based cryptography
- standard model
- signcryption scheme
- security properties
- wireless sensor networks
- provably secure
- key agreement
- signature scheme
- ad hoc networks
- diffie hellman
- resource constrained
- security requirements
- security model
- mobile ad hoc networks
- blind signature scheme
- encryption scheme
- security policies
- information security
- security services
- access control
- sensitive data
- security analysis
- public key
- intrusion detection
- cryptographic protocols
- secure communication
- security architecture
- elliptic curve
- security protocols
- key agreement protocol
- network security
- security mechanisms
- terms of computational efficiency
- security issues