Identity-based construction for secure and efficient handoff authentication schemes in wireless networks.
Y. H. ZhangX. F. ChenH. LiJ. CaoPublished in: Secur. Commun. Networks (2012)
Keyphrases
- wireless networks
- provably secure
- key management
- ad hoc networks
- key distribution
- wireless communication
- public key cryptography
- base station
- wireless local area network
- mobile computing
- mobile networks
- multi hop
- network access
- bilinear pairings
- wifi
- access points
- cellular networks
- mobile ipv
- authentication protocol
- public key
- heterogeneous wireless networks
- call admission control
- identity based cryptography
- multimedia services
- wireless ad hoc networks
- standard model
- user authentication
- graphical password
- video delivery
- wireless mesh networks
- encryption scheme
- security requirements
- mobile ad hoc networks
- data transmission
- resource management