A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography.
Gaurav SrivastavaRicha AgrawalKunwar SinghRajeev TripathiKshirasagar NaikPublished in: Peer-to-Peer Netw. Appl. (2020)
Keyphrases
- delay tolerant
- information security
- key management
- identity based encryption
- road network
- end to end delay
- identity based cryptography
- encryption scheme
- signcryption scheme
- network infrastructure
- standard model
- location privacy
- security model
- public key
- security policies
- security issues
- security requirements
- public key cryptography
- provably secure
- social networks
- mobile users
- intrusion detection
- security mechanisms
- rfid systems
- ciphertext
- statistical databases
- network security
- access control
- network resources
- resource constrained
- routing algorithm
- wireless sensor networks