Login / Signup
Cloud Access Secure with Identity Based Cryptography.
Houria Hamadi
Abdelkrim Khireddine
Abdelkamel Tari
Published in:
MSPN (2015)
Keyphrases
</>
identity based cryptography
key management
identity based signature
digital signature
cloud computing
bilinear pairings
provably secure
access control
ad hoc networks
security requirements
wireless sensor networks
key distribution
security model
group communication
diffie hellman
low cost
secure communication