Using Identity-Based Cryptography in Mobile Applications.
V. Mora-AfonsoPino Caballero-GilPublished in: SOCO-CISIS-ICEUTE (2013)
Keyphrases
- mobile applications
- identity based cryptography
- key management
- mobile devices
- smart phones
- mobile phone
- user experience
- context aware
- digital signature
- bilinear pairings
- ad hoc networks
- end users
- resource constrained
- lightweight
- user behavior
- wireless sensor networks
- wireless devices
- signcryption scheme
- database systems