Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks.
Katrin HoeperGuang GongPublished in: SecureComm (2005)
Keyphrases
- ad hoc networks
- key management
- key management scheme
- secure communication
- provably secure
- network topology
- routing protocol
- wireless ad hoc networks
- routing algorithm
- wireless networks
- mac protocol
- end to end
- identity based cryptography
- multi hop
- bilinear pairings
- peer to peer
- mobile wireless
- quality of service
- key distribution
- end to end delay
- wireless sensor networks
- network infrastructure
- mobile ad hoc networks
- base station
- resource constrained
- digital signature
- wireless mesh networks
- group communication
- mobile networks
- qos routing
- encryption scheme
- security services
- secret key
- network nodes
- wired networks
- access control
- service differentiation
- real time
- multi path routing