Intrusion-resilient identity-based signature: Security definition and construction.
Jia YuFanyu KongXiangguo ChengRong HaoJianxi FanPublished in: J. Syst. Softw. (2012)
Keyphrases
- identity based signature
- identity based cryptography
- standard model
- intrusion detection
- network security
- security model
- signature scheme
- key management
- intrusion detection and prevention
- intrusion detection system
- anomaly detection
- information security
- security policies
- encryption scheme
- security requirements
- public key
- security analysis
- diffie hellman
- signcryption scheme
- bilinear pairings
- network traffic