Blockchain-based Anonymous Authentication Key Management for Mobile Edge Computing.
Yun DengHaihua TangPublished in: CSCWD (2024)
Keyphrases
- key management
- key distribution
- identity based cryptography
- security services
- resource constrained
- secure communication
- wireless sensor networks
- authentication scheme
- key management scheme
- encryption decryption
- ad hoc networks
- security mechanisms
- digital signature
- mobile devices
- provably secure
- secret sharing scheme
- secret key
- mobile phone
- elliptic curve
- security protocols
- mobile networks
- public key cryptography
- mobile applications
- routing protocol
- user authentication
- sensor nodes
- metadata