Login / Signup
Identity-Based Cryptography for Securing Mobile Phone Calls.
Matthew Smith
Christian Schridde
Björn Agel
Bernd Freisleben
Published in:
AINA Workshops (2009)
Keyphrases
</>
mobile phone
identity based cryptography
key management
mobile devices
mobile users
bilinear pairings
ad hoc networks
digital signature
mobile technologies
real time
wireless sensor networks
information security
elliptic curve
public key
cellular networks
signcryption scheme