Secure checkpointing using public key cryptography in mobile computing.
Suparna BiswasSarmistha NeogyPublished in: IEEE ANTS (2011)
Keyphrases
- mobile computing
- public key cryptography
- public key
- distributed systems
- wireless networks
- security services
- digital signature
- mobile devices
- public key infrastructure
- elliptic curve
- security model
- provably secure
- context aware
- ubiquitous computing
- data management
- distributed databases
- fault tolerance
- data collection
- mobile agents
- computing environments
- wireless communication
- mobile users
- transaction processing
- security analysis
- fault tolerant
- key management
- smart card
- diffie hellman
- encryption scheme
- distributed environment
- signature scheme
- security requirements
- database
- security mechanisms
- load balancing
- learning activities
- wireless sensor networks
- metadata