Secure mobile communication via identity-based cryptography and server-aided computations.
Matthew SmithChristian SchriddeBjörn AgelBernd FreislebenPublished in: J. Supercomput. (2011)
Keyphrases
- mobile communication
- identity based cryptography
- key management
- digital signature
- wireless sensor networks
- wireless communication
- ad hoc networks
- base station
- mobile terminals
- social networking
- security protocols
- resource constrained
- authentication protocol
- key distribution
- secure communication
- diffie hellman
- mobile services
- bilinear pairings
- group communication
- wireless networks
- provably secure
- secret sharing scheme
- elliptic curve
- security mechanisms
- security services
- smart card
- secret key
- sensor nodes
- public key
- security requirements
- routing protocol
- sensor networks
- end users