Login / Signup
Provable Cryptographic Security and its Applications to Mobile Wireless Computing.
Craig Gentry
Zulfikar Ramzan
Published in:
Wirel. Pers. Commun. (2004)
Keyphrases
</>
mobile wireless
key management
ad hoc networks
security protocols
wireless networks
sensor networks
security properties
encryption decryption
encryption scheme
secure communication
security requirements
data broadcasting
smart card
fuzzy vault
cryptographic protocols
data security
security analysis
base station
information security
wireless sensor networks
high assurance
encryption key
cryptographic algorithms
elliptic curve cryptography
routing protocol
stream cipher
security policies
digital signature
secret key
provably secure
network security
random number generator
security services
access control
elliptic curve
security issues